共 50 条
- [31] Systematic change of data representation: Program manipulations and a case study PROGRAMMING LANGUAGES AND SYSTEMS, 1998, 1381 : 252 - 266
- [32] POSTER: Biometric Data Transformation for Cryptographic Domains and its Application PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 304 - 305
- [33] Cryptographic Public Verification of Data Integrity for Cloud Storage Systems IEEE CLOUD COMPUTING, 2016, 3 (05): : 44 - 52
- [35] Linkage Deanonymization Risks, Data-Matching and Privacy: A Case Study 1600, Institute of Electrical and Electronics Engineers Inc.
- [36] Linkage Deanonymization Risks, Data-Matching and Privacy: A Case Study 2024 8TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2024, 2024, : 10 - 16
- [37] Needs and Issues of Covariance Data Application NUCLEAR DATA SHEETS, 2008, 109 (12) : 2725 - 2732
- [38] Combining Spatial Data Layers using Fuzzy Inference Systems: Application to an Agronomic Case Study PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON GEOGRAPHICAL INFORMATION SYSTEMS THEORY, APPLICATIONS AND MANAGEMENT (GISTAM), 2020, : 62 - 71