|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2203 occurrences of 764 keywords
|
|
|
Results
Found 3902 publication records. Showing 3902 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
33 | Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan 0001 |
Mondrian Multidimensional K-Anonymity. |
ICDE |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi |
Towards low-perturbation anonymity preserving pattern discovery. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Aharon S. Brodie, Cheng-Zhong Xu 0001, Weisong Shi |
Shubac: a searchable P2P network utilizing dynamic paths for client/server anonymity. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Min Wu, Xiaojun Ye |
Towards the Diversity of Sensitive Attributes in k-Anonymity. |
IAT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Luis von Ahn, Andrew Bortz, Nicholas J. Hopper, Kevin O'Neill |
Selectively Traceable Anonymity. |
Privacy Enhancing Technologies |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Miyako Ohkubo, Masayuki Abe |
On the Definition of Anonymity for Ring Signatures. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Miyuki Imada, Masakatsu Ohta, Masayasu Yamaguchi |
LooM: An Anonymity Quantification Method in Pervasive Computing Environments. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Xin-guang Zou, Sheng-He Sun |
Analysis of Anonymity on the Signatures of Knowledge. |
IIH-MSP |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi |
Blocking Anonymity Threats Raised by Frequent Itemset Mining. |
ICDM |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Aggelos Kiayias, Moti Yung |
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Daniel R. Figueiredo 0001, Jonathan K. Shapiro, Donald F. Towsley |
Incentives to Promote Availability in Peer-to-Peer Anonymity Systems. |
ICNP |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean Mayo |
MuON: Epidemic Based Mutual Anonymity. |
ICNP |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Hung-Yu Chien, Che-Hao Chen |
A Remote Authentication Scheme Preserving User Anonymity. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Changjie Wang, Dickson K. W. Chiu, Ho-fung Leung |
Anonymity and Security in Public Internet Forums. |
CEC |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Chris J. Mitchell |
Limits to Anonymity When Using Credentials (Transcript of Discussion). |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Vicente Benjumea, Javier López 0001, José A. Montenegro, José M. Troya |
A First Approach to Provide Anonymity in Attribute Certificates. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Richard E. Newman, Vipan R. Nalla, Ira S. Moskowitz |
Anonymity and Covert Channels in Simple Timed Mix-Firewalls. |
Privacy Enhancing Technologies |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Alf Zugenmaier |
FLASCHE - A Mechanism Providing Anonymity for Mobile Users. |
Privacy Enhancing Technologies |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Changjie Wang, Ho-fung Leung |
Anonymity and Security in Continuous Double Auctions for Internet Retails Market. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Yingwu Zhu, Yiming Hu |
TAP: A Novel Tunneling Approach for Anonymity in Structured P2P Systems. |
ICPP |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Claudia Díaz, Bart Preneel |
Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic. |
Information Hiding |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji |
Evaluation of Anonymity of Practical Anonymous Communication Networks. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Andrei Serjantov, Peter Sewell |
Passive Attack Analysis for Connection-Based Anonymity Systems. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee 0001, Jong In Lim 0001 |
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Hua Wang 0002, Jinli Cao, Yahiko Kambayashi |
Building consumer self-anonymity scalable payment protocol for Internet purchase. |
RIDE |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Tomas Sander, Amnon Ta-Shma |
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Elke Franz 0001, Anja Jerichow |
A Mix-Mediated Anonymity Service and Its Payment. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
33 | Steve A. Schneider, Abraham Sidiropoulos |
CSP and Anonymity. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
32 | Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, Nikos Mamoulis |
A framework for efficient data anonymization under privacy and accuracy constraints. |
ACM Trans. Database Syst. |
2009 |
DBLP DOI BibTeX RDF |
Privacy, anonymity |
32 | Prateek Mittal, Nikita Borisov |
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
peer-to-peer, anonymity, random walks |
32 | Gavin O'Gorman, Stephen Blott |
Simulating low-latency anonymous networks. |
SpringSim |
2009 |
DBLP DOI BibTeX RDF |
SSFNet, anonymity, Tor |
32 | Mafruz Zaman Ashrafi, See-Kiong Ng |
Collusion-resistant anonymous data collection method. |
KDD |
2009 |
DBLP DOI BibTeX RDF |
data mining, privacy, anonymity |
32 | Heiko Roßnagel, Jan Zibuschka, Lexi Pimenidis, Thomas Deselaers |
Facilitating the Adoption of Tor by Focusing on a Promising Target Group. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
anonymity services, privacy, business models, Adoption |
32 | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001 |
Publicly Verifiable Privacy-Preserving Group Decryption. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Group decryption, Anonymity, Bilinear pairing, Group-oriented cryptography |
32 | Bhuvan Bamba, Ling Liu 0001, Péter Pesti, Ting Wang 0006 |
Supporting anonymous location queries in mobile environments with privacygrid. |
WWW |
2008 |
DBLP DOI BibTeX RDF |
location privacy, k-anonymity, l-diversity |
32 | Jian-min Han, Ting-ting Cen, Huiqun Yu |
An Improved V-MDAV Algorithm for l-Diversity. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
Homogeneity Attack, Background Knowledge Attack, K-Anonymity, L-Diversity |
32 | Jiexing Li, Yufei Tao 0001, Xiaokui Xiao |
Preservation of proximity privacy in publishing numerical sensitive data. |
SIGMOD Conference |
2008 |
DBLP DOI BibTeX RDF |
(?, m)-anonymity, privacy, anonymization, numeric |
32 | Gabriele Gianini, Ernesto Damiani |
Cloaking games in location based services. |
SWS |
2008 |
DBLP DOI BibTeX RDF |
game theory, location based services, k-anonymity |
32 | Pan Wang, Peng Ning, Douglas S. Reeves |
A k-anonymous communication protocol for overlay networks. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
security, anonymity, overlay networks |
32 | Steven J. Murdoch |
Hot or not: revealing hidden services by their clock skew. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
anonymity, fingerprinting, temperature, covert channels, clock skew, mix networks, Tor |
32 | Josep Domingo-Ferrer |
Microaggregation for Database and Location Privacy. |
NGITS |
2006 |
DBLP DOI BibTeX RDF |
Statistical database privacy, Location privacy, k-Anonymity, Wireless systems, Microaggregation |
32 | Daniel Kifer, Johannes Gehrke |
Injecting utility into anonymized datasets. |
SIGMOD Conference |
2006 |
DBLP DOI BibTeX RDF |
loglinear models, graphical models, k-anonymity, marginals, l-diversity |
32 | Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto |
Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. |
ICUCT |
2006 |
DBLP DOI BibTeX RDF |
Security, Routing, Ad-hoc network, Anonymity, Pairing-Based Cryptography |
32 | He Ge, Stephen R. Tate |
Traceable Signature: Better Efficiency and Beyond. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Variable Anonymity, Cryptographic Protocol, Group signature, Anonymous Authentication, Traceable Signature |
32 | Xiaoxin Wu 0001, Bharat K. Bhargava |
AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol. |
IEEE Trans. Mob. Comput. |
2005 |
DBLP DOI BibTeX RDF |
communication privacy, channel access mechanism, anonymity, Ad hoc routing protocol |
32 | Ryotaro Hayashi 0001, Keisuke Tanaka |
Universally Anonymizable Public-Key Encryption. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy |
32 | Ronggong Song, Larry Korba, George Yee |
AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. |
SASN |
2005 |
DBLP DOI BibTeX RDF |
security, mobile ad hoc network, anonymity, dynamic source routing |
32 | Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields |
The predecessor attack: An analysis of a threat to anonymous communications systems. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
predecessor attack, Privacy, anonymity, anonymous communication |
32 | Ira S. Moskowitz, Richard E. Newman, Daniel P. Crepeau, Allen R. Miller |
Covert channels and anonymizing networks. |
WPES |
2003 |
DBLP DOI BibTeX RDF |
anonymity, information theory, covert channel, MIX |
32 | George Danezis |
Mix-Networks with Restricted Routes. |
Privacy Enhancing Technologies |
2003 |
DBLP DOI BibTeX RDF |
mix cascades, anonymity, traffic analysis, Mix networks |
32 | Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Self-Escrowed Cash against User Blackmailing. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
Escrowed Cash, Fair Cash, Digital Coin, Blackmailing, Self-Escrow, Anonymity Revocation |
30 | Vivian Hsueh-hua Chen, Henry Been-Lirn Duh, Chiew Woon Ng |
Players who play to make others cry: the influence of anonymity and immersion. |
Advances in Computer Entertainment Technology |
2009 |
DBLP DOI BibTeX RDF |
deindividuation, grief play, games, anonymity, immersion |
30 | Renyi Xiao |
Survey on Anonymity in Unstructured Peer-to-Peer Systems. |
J. Comput. Sci. Technol. |
2008 |
DBLP DOI BibTeX RDF |
unstructured peer-to-peer systems, mutual anonymity, privacy, distributed system |
30 | Yingqin Zhong, Na Liu 0005, John Lim |
Effects of Cultural Orientation on Attitude Toward Anonymity in E-Collaboration. |
Open IT-Based Innovation |
2008 |
DBLP DOI BibTeX RDF |
cultural orientation, degree of collectivism, anonymity, Attitude, e-collaboration |
30 | Richard Matthew McCutchen, Samir Khuller |
Streaming Algorithms for k-Center Clustering with Outliers and with Anonymity. |
APPROX-RANDOM |
2008 |
DBLP DOI BibTeX RDF |
clustering, anonymity, streaming, outliers, k-center |
30 | Jun-Lin Lin, Meng-Cheng Wei |
An efficient clustering method for k-anonymization. |
PAIS |
2008 |
DBLP DOI BibTeX RDF |
clustering, anonymity, greedy algorithm |
30 | Hyoungmin Park, Kyuseok Shim |
Approximate algorithms for K-anonymity. |
SIGMOD Conference |
2007 |
DBLP DOI BibTeX RDF |
local recoding, data mining, anonymity, privacy preservation, data publishing |
30 | Wei Jiang, Chris Clifton |
A secure distributed framework for achieving k-anonymity. |
VLDB J. |
2006 |
DBLP DOI BibTeX RDF |
Security, Privacy, k-Anonymity |
30 | Monte Lunacek, L. Darrell Whitley, Indrakshi Ray |
A crossover operator for the k- anonymity problem. |
GECCO |
2006 |
DBLP DOI BibTeX RDF |
problem representation, genetic algorithms, K-anonymity |
30 | Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Peter van Rossum |
Provable anonymity. |
FMSE |
2005 |
DBLP DOI BibTeX RDF |
privacy, formal methods, cryptography, anonymity, knowledge, epistemic logic, unlinkability, crowds, onion routing |
30 | Marek Klonowski, Miroslaw Kutylowski |
Provable Anonymity for Networks of Mixes. |
Information Hiding |
2005 |
DBLP DOI BibTeX RDF |
anonymity, Markov chain, coupling, mix network, rapid mixing |
30 | Frances M. T. Brazier, Anja Oskamp, Corien Prins, Maurice Schellekens, Niek J. E. Wijngaards |
Anonymity and software agents: An interdisciplinary challenge. |
Artif. Intell. Law |
2004 |
DBLP DOI BibTeX RDF |
pseudoanonymity, agent identity, security, privacy, anonymity, software agents, legal aspects |
30 | Anna Shubina, Sean W. Smith |
Using caching for browsing anonymity. |
SIGecom Exch. |
2003 |
DBLP DOI BibTeX RDF |
caching proxies, security, privacy, anonymity, human factors, legal aspects |
30 | Matthias Bauer |
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets. |
WPES |
2003 |
DBLP DOI BibTeX RDF |
anonymity, HTTP, covert channel, mix network |
30 | Emiran Curtmola, Alin Deutsch, K. K. Ramakrishnan, Divesh Srivastava |
Load-balanced query dissemination in privacy-aware online communities. |
SIGMOD Conference |
2010 |
DBLP DOI BibTeX RDF |
privacy aware, publisher k-anonymity, query dissemination, user censorship resistant, load balancing, online communities, privacy preservation, k-anonymity, distributed infrastructure |
30 | Arjan Durresi |
Anonymous communications in the Internet. |
Clust. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Tradeoff between anonymity and communication overhead, Communication anonymity |
28 | Hiroaki Morio, Christopher Buchholz |
How anonymous are you online? Examining online social behaviors from a cross-cultural perspective. |
AI Soc. |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Zhen Zhang, K. H. (Kane) Kim, Myeong-Ho Kang, Tianran Zhou, Byung-Ho Chung, Shin-Hyo Kim, Seok-Joon Lee |
An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
payment gateway, Anonymous, encryption, mix, purchasing, e-cash, information product |
28 | Parvathinathan Venkitasubramaniam, Ting He 0001, Lang Tong |
Anonymous Networking Amidst Eavesdroppers. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Bo Zhu 0001, Kui Ren 0001, Lingyu Wang 0001 |
Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Yalong Dong, Zude Li, Xiaojun Ye |
Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets. |
APWeb |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Jens O. Oberender, Hermann de Meer |
On the Design Dilemma in Dining Cryptographer Networks. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Li Lu 0001, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao Liu 0001, Lionel M. Ni |
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Wei Jiang, Maurizio Atzori |
Secure Distributed k-Anonymous Pattern Mining. |
ICDM |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Byungryong Kim |
Using Group Overlapping to Protect Server from Attack in Grid Computing. |
SAFECOMP |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Byungryong Kim |
Protecting Agent from Attack in Grid Computing. |
CDVE |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger |
Solving Bao's Colluding Attack in Wang's Fair Payment Protocol. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Li Xiao 0001, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao Liu 0001 |
A design of overlay anonymous multicast protocol. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Stefan Köpsell |
Low Latency Anonymous Communication - How Long Are Users Willing to Wait?. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Zude Li, Guoqiang Zhan, Xiaojun Ye |
Towards a More Reasonable Generalization Cost Metric for K-Anonymization. |
BNCOD |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Kai Wei, Alan J. Smith, Yih-Farn Robin Chen, Binh Vo |
WhoPay: A Scalable and Anonymous Payment System for Peer-to-Peer Environments. |
ICDCS |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Jinsong Han, Yunhao Liu 0001 |
Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems. |
ICNP |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura |
Toward the Fair Anonymous Signatures: Deniable Ring Signatures. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Hua Wang 0002, Jinli Cao, Yanchun Zhang |
A Flexible Payment Scheme and Its Role-Based Access Control. |
IEEE Trans. Knowl. Data Eng. |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng |
Performance Analysis ofWonGoo System. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Gagan Aggarwal, Tomás Feder, Krishnaram Kenthapadi, Rajeev Motwani 0001, Rina Panigrahy, Dilys Thomas, An Zhu |
Anonymizing Tables. |
ICDT |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli |
A Hierarchical Anonymous Communication Protocol for Sensor Networks. |
EUC |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Krista Bennett, Christian Grothoff |
gap - Practical Anonymous Networking. |
Privacy Enhancing Technologies |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Sandra Steinbrecher, Stefan Köpsell |
Modelling Unlinkability. |
Privacy Enhancing Technologies |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Aameek Singh, Ling Liu 0001 |
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. |
Peer-to-Peer Computing |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao 0001 |
An Optimal Strategy for Anonymous Communication Protocols. |
ICDCS |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Alberto Coen-Porisini, Pietro Colombo, Sabrina Sicari |
Dealing with anonymity in wireless sensor networks. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Edith C. H. Ngai |
On providing sink anonymity for sensor networks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
sensor networks, privacy, wireless communications, data collection |
26 | Michael Backes 0001, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, Gerhard Weikum |
Anonymity and Censorship Resistance in Unstructured Overlay Networks. |
OTM Conferences (1) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | David Evans 0002, Robert H. Warren |
Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Wazen M. Shbair, Ahmed R. Bashandy, Samir I. Shaheen |
A New Security Mechanism to Perform Traffic Anonymity with Dummy Traffic Synthesis. |
CSE (1) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | B. R. Purushothama, Alwyn R. Pais |
Design and Implementation of Secure Internet Based Voting System with User Anonymity Using Identity Based Encryption System. |
IEEE SCC |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Aris Gkoulalas-Divanis, Vassilios S. Verykios |
A Free Terrain Model for Trajectory K-Anonymity. |
DEXA |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Ge Zhong, Urs Hengartner |
Toward a distributed k-anonymity protocol for location privacy. |
WPES |
2008 |
DBLP DOI BibTeX RDF |
location-based services, homomorphic encryption |
26 | Zhihui Wang 0009, Wei Wang 0009, Baile Shi |
A New Approach for Detecting Anonymity of Patterns. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 3902 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|