Author of the publication

k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing.

, , and . DBSec, volume 7371 of Lecture Notes in Computer Science, page 263-273. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cooperative security administration in multi-security-domain environments using a variant of deontic logic., , , and . Sci. Iran., 19 (3): 635-653 (2012)Access control enforcement on outsourced data ensuring privacy of access control policies., , and . HPCS, page 491-497. IEEE, (2011)Access control aware data retrieval for secret sharing based database outsourcing., , and . Distributed Parallel Databases, 34 (4): 505-534 (2016)Multi-User Dynamic Searchable Symmetric Encryption with Corrupted Participants., , , , and . IACR Cryptol. ePrint Arch., (2022)AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems., and . SECURWARE, page 31-36. IEEE Computer Society, (2009)DSCA: an inline and adaptive application identification approach in encrypted network traffic., , and . ICCSP, page 39-43. ACM, (2019)k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing., , and . DBSec, volume 7371 of Lecture Notes in Computer Science, page 263-273. Springer, (2012)An Access Control Framework for Pervasive Computing Environments., , and . PSC, page 97-103. CSREA Press, (2006)Security Enhancement for a Low Computation Cost User Authentication Scheme., , and . SECRYPT, page 5-8. INSTICC Press, (2006)An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments., , and . AICCSA, page 1097-1100. IEEE Computer Society, (2006)