DOI:10.20894/IJDMTA. Periodicity: Bi Annual. Impact Factor: SJIF:4.893 & GIF:0.787 Submission:Any Time Publisher: IIR Groups Language: English Review Process: Double Blinded
N.R. Adam and J.C. Wortmann, "Security-Control Methods for Statistical Databases: A Comparative Study", ACM ComputingSurveys ,Vol.21 ,Issue 4 ,1989 View Artical
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D.Thomas, and A. Zhu, "Anonymizing Tables", Proc. Int?l Conf.Database Theory (ICDT) ,2005 View Artical
R. Agrawal, A. Evfimievski, and R. Srikant, "Information Sharing across Private Databases", Proc. ACM SIGMOD Int?l Conf.Management View Artical
C. Blake and C. Merz,, "UCI Repository of Machine Learning Databases View Artical
E. Bertino and R. Sandhu, "Database Security?Concepts, Approaches and Challenges", IEEE Trans Dependable and Secure Computing ,Vol.2 ,Issue 1 ,2005 View Artical
D. Boneh, "The Decision Diffie-Hellman Problem", Proc. Int?l Algorithmic Number Theory Symp ,1998 View Artical
D. Boneh, G. di Crescenzo, R. Ostrowsky, and G. Persiano, "Public Key Encryption with KeyworSearch ,2004 View Artical
S. Brands, "Untraceable Offline Cash in Wallets with Observers", Proc.CRYPTO Int?l Conf., ,1994 View Artical
J.W. Byun, T. Li, E. Bertino, N. Li, and Y. Sohn,, "Privacy-Preserving Incremental Data Dissemination", J. Computer Security ,2009 View Artical