Author of the publication

Security and Privacy Implications on Database Systems in Big Data Era: A Survey.

, and . IEEE Trans. Knowl. Data Eng., 33 (1): 239-258 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differentially Private Principal Component Analysis Over Horizontally Partitioned Data., and . DSC, page 1-8. IEEE, (2018)Performance Enhancements to the Active Memory System., , and . ICCD, page 249-. IEEE Computer Society, (2002)Scalable Hardware-Algorithm for Mark-Sweep Garbage Collection., , and . EUROMICRO, page 1274-1281. IEEE Computer Society, (2000)Turning Hidden Nodes into Helper Nodes in IEEE 802.11 Wireless LAN Networks., and . Networking, volume 4982 of Lecture Notes in Computer Science, page 824-835. Springer, (2008)CONTI: Constant-Time Contention Resolution for WLAN Access., and . NETWORKING, volume 3462 of Lecture Notes in Computer Science, page 358-369. Springer, (2005)Analysis and Enhancement of Bandwidth Request Strategies in IEEE 802.16 Networks., , and . ICC, page 1-5. IEEE, (2010)IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond., , , , and . IT Prof., 25 (5): 17-19 (September 2023)The New Mobile Computing Landscape., , , and . IT Prof., 14 (5): 9-11 (2012)A performance perspective on the Active Memory System., , and . Microprocess. Microsystems, 26 (9-10): 421-432 (2002)Object resizing and reclamation through the use of hardware bit-maps., , and . Microprocess. Microsystems, 25 (9-10): 459-467 (2002)