-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. Adam and J. Wortman. Security-control methods for statistical databases: A comparative study. Association for Computing Machinery Computing Surveys, 21(4):515–556, December 1989.
-
(1989)
Association for Computing Machinery Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.1
Wortman, J.2
-
3
-
-
0037430997
-
HIPAA regulations – a new era of medical-record privacy
-
April 10
-
G.J. Annas. HIPAA regulations – a new era of medical-record privacy? The New England Journal of Medicine, 348(13):1486–1490, April 10 2003.
-
(2003)
The New England Journal of Medicine
, vol.348
, Issue.13
, pp. 1486-1490
-
-
Annas, G.J.1
-
4
-
-
0015183542
-
General model for the genetic analysis of pedigree data
-
R.C. Elston and J. Stewart. General model for the genetic analysis of pedigree data. Human Heredity, 21:523–542, 1971.
-
(1971)
Human Heredity
, vol.21
, pp. 523-542
-
-
Elston, R.C.1
Stewart, J.2
-
6
-
-
84958973625
-
-
version 3.1, November
-
A. Hundepool, A. vanDeWetering, R. Ramaswamy, P.P. deWolf, S. Giessing, M. Fischietti, J.J. Salazar, J. Castro, and P. Lowthian. The τ -argus user’s manual, version 3.1. http://neon.vb.cbs.nl/CENEX/Software/TauManualV31.pdf, November 2004.
-
(2004)
The τ -Argus user’s Manual
-
-
Hundepool, A.1
Vandewetering, A.2
Ramaswamy, R.3
Dewolf, P.P.4
Giessing, S.5
Fischietti, M.6
Salazar, J.J.7
Castro, J.8
Lowthian, P.9
-
7
-
-
84958973625
-
-
version 4.0, November
-
A. Hundepool, A. vanDeWetering, R. Ramaswamy, L. Franconi, S. Polettini, A. Capobianchi, P.P. deWolf, J. Domingo, V. Torra, R. Brand, and S. Giessing. The μ-argus user’s manual, version 4.0. http://neon.vb.cbs.nl/CASC/deliv/MUmanual4.0.pdf, November 2004.
-
(2004)
The μ-argus user’s Manual
-
-
Hundepool, A.1
Vandewetering, A.2
Ramaswamy, R.3
Franconi, L.4
Polettini, S.5
Capobianchi, A.6
Dewolf, P.P.7
Domingo, J.8
Torra, V.9
Brand, R.10
Giessing, S.11
-
8
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
September
-
M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 16(9):1026–1037, September 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
10
-
-
33746437508
-
Privacy preserving data mining
-
June
-
Y. Lindell and B. Pinkas. Privacy preserving data mining. Journal of Cryptology, 15(3):177–206, June 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
12
-
-
84919085619
-
An improved algorithm for computing logarithm of GF(P) and its cryptographic significance
-
S.C. Pohlig and M.E. Hellman. An improved algorithm for computing logarithm of GF(p) and its cryptographic significance. IEEE Transactions on Information Theory, IT24:106–110, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.IT24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
13
-
-
33744584654
-
Induction of decision trees
-
J.R. Quinlan. Induction of decision trees. Machine Learning, 1(1):81–106, 1986.
-
(1986)
Machine Learning
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.R.1
|