-
1
-
-
0018506338
-
The effectiveness of output modification by rounding for protection of statistical databases
-
J. O. Achugbue and F. Y. Chin, The effectiveness of output modification by rounding for protection of statistical databases, INFOR 17, 3: 209-218, 1979.
-
(1979)
INFOR
, vol.17
, Issue.3
, pp. 209-218
-
-
Achugbue, J.O.1
Chin, F.Y.2
-
2
-
-
0024914229
-
Security-Control Methods for Statistical Databases: A Comparative Study
-
N. R. Adam and J. C. Wortmann, Security-Control Methods for Statistical Databases: A Comparative Study, ACM Computing Surveys 21(4): 515-556 (1989).
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
5
-
-
0003430191
-
-
Wiley-Interscience [John Wiley & Sons], New York, second edition
-
N. Alon and J. H. Spencer, The probabilistic method, Wiley-Interscience [John Wiley & Sons], New York, second edition, 2000.
-
(2000)
The Probabilistic Method
-
-
Alon, N.1
Spencer, J.H.2
-
6
-
-
0019056889
-
A Security Mechanism for Statistical databases
-
September
-
L. L. Beck, A security mechanism for statistical databases, ACM TODS, 5(3):316-338, September 1980.
-
(1980)
ACM TODS
, vol.5
, Issue.3
, pp. 316-338
-
-
Beck, L.L.1
-
7
-
-
0020205885
-
Auditing and infrence control in statistical databases
-
April
-
F. Y. Chin and G. Ozsoyoglu, Auditing and infrence control in statistical databases, IEEE Trans. Softw. Eng., SE-8(6):113-139, April 1982.
-
(1982)
IEEE Trans. Softw. Eng.
, vol.SE-8
, Issue.6
, pp. 113-139
-
-
Chin, F.Y.1
Ozsoyoglu, G.2
-
8
-
-
0018442066
-
The tracker: A threat to statistical database security
-
March
-
D. Denning, P. Denning, and M. Schwartz, The tracker: A threat to statistical database security, ACM Trans. on Database Systems, 4(1):76-96, March 1979.
-
(1979)
ACM Trans. on Database Systems
, vol.4
, Issue.1
, pp. 76-96
-
-
Denning, D.1
Denning, P.2
Schwartz, M.3
-
9
-
-
0019054751
-
Secure statistical databases with random sample queries
-
September
-
D. E. Denning, Secure statistical databases with random sample queries, ACM Transactions on Database Systems, 5(3):291-315, September 1980.
-
(1980)
ACM Transactions on Database Systems
, vol.5
, Issue.3
, pp. 291-315
-
-
Denning, D.E.1
-
12
-
-
0023545076
-
How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority
-
O. Goldreich, S. Micali and A. Wigderson, How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority, STOC 1987: 218-229.
-
(1987)
STOC 1987
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
15
-
-
0022130080
-
A data distortion by probability distribution
-
C. K. Liew, U. J. Choi, and C. J. Liew, A data distortion by probability distribution, ACM TODS, 10(3):395-411, 1985.
-
(1985)
ACM TODS
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.K.1
Choi, U.J.2
Liew, C.J.3
-
16
-
-
0020947978
-
An analytic approach to statistical databases
-
Morgan Kaufmann, Oct-Nov
-
E. Lefons, A. Silvestri, and F. Tangorra, An analytic approach to statistical databases, In 9th Int. Conf. Very Large Data Bases, pages 260-274. Morgan Kaufmann, Oct-Nov 1983.
-
(1983)
9th Int. Conf. Very Large Data Bases
, pp. 260-274
-
-
Lefons, E.1
Silvestri, A.2
Tangorra, F.3
-
17
-
-
0021389555
-
Practical Data Swapping: The First Steps
-
S. Reiss, Practical Data Swapping: The First Steps, ACM TODS, 9, 1, pp. 20-37, 1984.
-
(1984)
ACM TODS
, vol.9
, Issue.1
, pp. 20-37
-
-
Reiss, S.1
-
19
-
-
0031097176
-
Decoding of Reed Solomon Codes beyond the Error-Correction Bound
-
M. Sudan, Decoding of Reed Solomon Codes beyond the Error-Correction Bound, Journal of Complexity, 13 (1), 180-193, 1997.
-
(1997)
Journal of Complexity
, vol.13
, Issue.1
, pp. 180-193
-
-
Sudan, M.1
-
20
-
-
0021622802
-
The Statistical Security of a Statistical Database
-
11
-
J. Traub, Y. Yemini, H. Wozniakowksi, The Statistical Security of a Statistical Database, ACM TODS, 9, 4 pp. 672-679, 1984. 11
-
(1984)
ACM TODS
, vol.9
, Issue.4
, pp. 672-679
-
-
Traub, J.1
Yemini, Y.2
Wozniakowksi, H.3
-
21
-
-
0020312165
-
Protocols for Secure Computations (Extended Abstract)
-
A. Yao, Protocols for Secure Computations (Extended Abstract), FOCS 1982: 160-164.
-
(1982)
FOCS 1982
, pp. 160-164
-
-
Yao, A.1
|