Extraction and Analysis of Spatial Correlation Micrograph Features for Traceability in Manufacturing. | 0 | 0.34 | 2020 |
Strategic information revelation in collaborative design. | 2 | 0.36 | 2018 |
Secure Collaboration in Engineering Systems Design. | 0 | 0.34 | 2017 |
On approximate pattern matching with thresholds. | 2 | 0.35 | 2017 |
Security and privacy risks in electronic communications: A user's assessment | 0 | 0.34 | 2017 |
Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords. | 0 | 0.34 | 2016 |
A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage. | 0 | 0.34 | 2014 |
Secure and Private Outsourcing of Shape-Based Feature Extraction | 9 | 0.52 | 2013 |
Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS | 9 | 0.61 | 2012 |
Secure and Efficient Outsourcing of Sequence Comparisons. | 31 | 1.13 | 2012 |
Privacy-Preserving Business Process Outsourcing | 5 | 0.44 | 2012 |
Efficient and Practical Approach for Private Record Linkage | 5 | 0.41 | 2012 |
Guest Editors' Introduction: Software Protection | 22 | 1.05 | 2011 |
Pattern matching in the Hamming distance with thresholds | 2 | 0.41 | 2011 |
Asymptotically efficient algorithms for skyline probabilities of uncertain data | 18 | 0.70 | 2011 |
Data structures for range minimum queries in multidimensional arrays | 32 | 1.37 | 2010 |
Duress detection for authentication attacks against multiple administrators | 1 | 0.42 | 2010 |
Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings | 15 | 2.53 | 2010 |
Computing all skyline probabilities for uncertain data | 55 | 1.20 | 2009 |
Dynamic and efficient key management for access hierarchies | 164 | 6.82 | 2009 |
Translation-based steganography | 13 | 1.10 | 2009 |
Efficient Private Record Linkage | 22 | 0.97 | 2009 |
Efficient Distributed Third-Party Data Authentication for Tree Hierarchies | 4 | 0.43 | 2008 |
Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006 | 32 | 1.64 | 2008 |
Private combinatorial group testing | 3 | 0.39 | 2008 |
A tree-covering problem arising in integrity of tree-structured data | 1 | 0.36 | 2008 |
Incentives and Perceptions of Information Security Risks. | 7 | 0.59 | 2008 |
Discrepancy-sensitive dynamic fractional cascading, dominated maxima searching, and 2-D nearest neighbors in any minkowski metric | 0 | 0.34 | 2007 |
The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions | 36 | 1.80 | 2006 |
Point-based trust: define how much privacy is worth | 16 | 0.69 | 2006 |
Lost in just the translation | 31 | 1.39 | 2006 |
Key management for non-tree access hierarchies | 20 | 0.83 | 2006 |
Remote Revocation of Smart Cards in a Private DRM System | 1 | 0.42 | 2005 |
Privacy-preserving credit checking | 12 | 0.81 | 2005 |
Indexing information for data forensics | 39 | 1.72 | 2005 |
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming | 10 | 0.56 | 2005 |
A survey of watermarking techniques for non-media digital objects (invited talk) | 0 | 0.34 | 2005 |
Rights Protection for Categorical Data | 19 | 1.16 | 2005 |
Digital Rights Protection | 1 | 0.35 | 2004 |
Augmenting Lz-77 With Authentication And Integrity Assurance Capabilities | 2 | 0.42 | 2004 |
Succinct specifications of portable document access policies | 4 | 0.44 | 2004 |
Detection of Significant Sets of Episodes in Event Sequences | 35 | 3.37 | 2004 |
Attacking digital watermarks | 0 | 0.34 | 2004 |
Privacy-Preserving Location-Dependent Query Processing | 11 | 0.94 | 2004 |
Privacy preserving electronic surveillance | 7 | 0.75 | 2003 |
Adaptive data structures for IP lookups | 8 | 0.49 | 2003 |
Secure Supply-Chain Protocols. | 36 | 2.55 | 2003 |
Cropping-Resilient Segmented Multiple Watermarking | 3 | 0.43 | 2003 |
Secure and private sequence comparisons | 103 | 4.77 | 2003 |
On-the-fly Intrusion Detection for Web Portals | 3 | 0.63 | 2003 |