Author of the publication

Statistical Disclosure Control for Data Privacy Using Sequence of Generalised Linear Models.

, , , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 77-93. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography., , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Convolutional Neural Network-Based Collaborative Filtering for Recommendation Systems., , and . RiTA, volume 1015 of Communications in Computer and Information Science, page 117-131. Springer, (2018)Construction of Optimal Stock Market Portfolios Using Outlier Detection Algorithm., , , and . SCDS, volume 1489 of Communications in Computer and Information Science, page 160-173. Springer, (2021)Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis., , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 389-404. Springer, (2013)Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis., , and . IACR Cryptology ePrint Archive, (2012)Cryptanalysis of the full CHAIN cipher., , and . IAS, page 40-45. IEEE, (2011)IMAML-IDCG: Optimization-based meta-learning with ImageNet feature reusing for few-shot invasive ductal carcinoma grading., , , , , , and . Expert Syst. Appl., (2024)Security Mediated Certificateless Signatures., , , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 459-477. Springer, (2007)An improved preimage attack against HAVAL-3., , and . Inf. Process. Lett., 115 (2): 386-393 (2015)Cryptanalysis of a CP-ABE scheme with policy in normal forms., and . Inf. Process. Lett., 116 (7): 492-495 (2016)