-
2
-
-
0032027672
-
Data security
-
Bertino, E., 1998. Data security. Data Knowledge Eng., 25: 199-216.
-
(1998)
Data Knowledge Eng.
, vol.25
, pp. 199-216
-
-
Bertino, E.1
-
3
-
-
0036887410
-
Protection and administration of XML data sources
-
Bertino, E., S. Castano, E. Ferrari and M. Mesiti, 2002. Protection and administration of XML data sources. Data Knowledge Eng., 43: 237-260.
-
(2002)
Data Knowledge Eng.
, vol.43
, pp. 237-260
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
Mesiti, M.4
-
4
-
-
14644403631
-
An integrated tool for microarray data clustering and cluster validity assessment
-
DOI 10.1093/bioinformatics/bti190
-
Bolshakova, N., F. Azuaje and P. Cunningham, 2005. An integrated tool for microarray data clustering and cluster validity assessment. Bio informatics, 21: 451-455. (Pubitemid 40310231)
-
(2005)
Bioinformatics
, vol.21
, Issue.4
, pp. 451-455
-
-
Bolshakova, N.1
Azuaje, F.2
Cunningham, P.3
-
5
-
-
67549138653
-
A novel anti-data mining technique based on hierarchical anti-clustering (HAC)
-
Chen, T.S., J. Chen, Y.H. Kao and T.C. Hsieh, 2008. A novel anti-data mining technique based on hierarchical anti-clustering (HAC). Proc. 8th Int. Conf. Intel. Syst. Design Appl., 3: 426-430.
-
(2008)
Proc. 8th Int. Conf. Intel. Syst. Design Appl.
, vol.3
, pp. 426-430
-
-
Chen, T.S.1
Chen, J.2
Kao, Y.H.3
Hsieh, T.C.4
-
6
-
-
0003504808
-
Security and privacy implications of data mining
-
June 1996, Montreal, Canada
-
Clifton, C. and D. Marks, 1996. Security and privacy implications of data mining. Proceedings of the ACM SIGMOD Workshop on Data Mining and Knowledge Discovery, June 1996, Montreal, Canada, pp: 15-19.
-
(1996)
Proceedings of the ACM SIGMOD Workshop on Data Mining and Knowledge Discovery
, pp. 15-19
-
-
Clifton, C.1
Marks, D.2
-
7
-
-
3142756502
-
Open source clustering software
-
De Hoon, MIL, S. Imoto, J. Nolan and S. Miyano, 2004. Open source clustering software. Bio informatics, 20: 1453-1454.
-
(2004)
Bio Informatics
, vol.20
, pp. 1453-1454
-
-
De Hoon, M.1
Imoto, S.2
Nolan, J.3
Miyano, S.4
-
10
-
-
64549145427
-
Privacy-preserving data publishing for cluster analysis
-
Fung, B.C.M., K. Wangb, L. Wanga and P.C.K. Hung, 2009. Privacy-preserving data publishing for cluster analysis. Data Knowledge Eng., 68: 552-575.
-
(2009)
Data Knowledge Eng.
, vol.68
, pp. 552-575
-
-
Fung, B.C.M.1
Wangb, K.2
Wanga, L.3
Hung, P.C.K.4
-
11
-
-
0041914580
-
Secure access schemes in mobile database systems
-
Hwang, M.S. and C.H. Lee, 2001. Secure access schemes in mobile database systems. Eur. Trans. Telecommun., 12: 303-310.
-
(2001)
Eur. Trans. Telecommun.
, vol.12
, pp. 303-310
-
-
Hwang, M.S.1
Lee, C.H.2
-
12
-
-
39749130001
-
Transforming semi-honest protocols to ensure accountability
-
Jiang, W., C. Clifton and M. Kantarcyodu, 2008. Transforming semi-honest protocols to ensure accountability. Data Knowledge Eng., 65: 57-74.
-
(2008)
Data Knowledge Eng.
, vol.65
, pp. 57-74
-
-
Jiang, W.1
Clifton, C.2
Kantarcyodu, M.3
-
13
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
Liu, K., H. Kargupta and J. Ryan, 2006. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowledge Data Eng., 18: 92-106.
-
(2006)
IEEE Trans. Knowledge Data Eng.
, vol.18
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
14
-
-
41449115712
-
Measurement of performance impact of SSL on IP data transmissions
-
Rapuano, S. and E. Zimeo, 2008. Measurement of performance impact of SSL on IP data transmissions. Measurement, 41: 481-490.
-
(2008)
Measurement
, vol.41
, pp. 481-490
-
-
Rapuano, S.1
Zimeo, E.2
-
15
-
-
37049013902
-
VPN technology: IPSEC vs SSL
-
Rowan, T., 2007. VPN technology: IPSEC vs SSL. Network Security, 2007: 13-17.
-
(2007)
Network Security
, vol.2007
, pp. 13-17
-
-
Rowan, T.1
|