Author of the publication

Fingerprinting relational databases: schemes and specialties

, , and . Dependable and Secure Computing, IEEE Transactions on, 2 (1): 34-45 (January 2005)
DOI: 10.1109/TDSC.2005.12

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A flexible authorization mechanism for relational data management systems, , and . ACM Transactions on Information Systems, 17 (2): 101-140 (April 1999)Detecting Novel Network Intrusions using Bayes Estimators, , and . Proc. SIAM Intl. Conf. Data Mining, (2001)Protecting Privacy Against Location-Based Personal Identification, , and . Proceedings of 2nd VLDB Workshop on Secure Data Management (SDM), volume 3674/2005 of Lecture Notes in Computer Science, page 185-199. springer, (2005)Fingerprinting relational databases: schemes and specialties, , and . Dependable and Secure Computing, IEEE Transactions on, 2 (1): 34-45 (January 2005)