R. Bhadauria, R. Chaki, N. Chaki, and S. Sanyal. (2011)cite arxiv:1109.5388
Comment: The paper is communicated to the IEEE Communications Surveys and
Tutorials.
K. Brancik, and G. Ghinita. Proceedings of the first ACM conference on Data and application security and privacy, page 231--236. New York, NY, USA, ACM, (2011)
S. Sanyal, A. Shelat, and A. Gupta. (2010)cite arxiv:1010.1938
Comment: 4 Pages, Invited Paper in VCON'10: 2nd Vaagdevi International
Conference on Information Technology for Real World Problems Vaagdevi College
of Engineering, Warangal, Andhra Pradesh, India, December 9-11, 2010.
C. Blackwell. Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, page 45:1--45:4. New York, NY, USA, ACM, (2009)
K. Stoffel, and T. Studer. Database and Expert Systems Applications, volume 3588 of Lecture Notes in Computer Science, Springer, Berlin / Heidelberg, (2005)