[图书][B] Networking for big data

S Yu, X Lin, J Misic, XS Shen - 2015 - books.google.com
This book supplies an unprecedented look at the latest research on the networking and
communication aspects of Big Data. Starting with a comprehensive introduction to Big Data …

[PDF][PDF] A tool for protecting electronic data in centralized database using improved advance encryption standard (AES) and secure hash algorithm (SHA)

A Malviya, R Gupta, S Sharma - International Journal of Computer …, 2015 - researchgate.net
In recent years, there is a wide amount of data available; which can be any one's personal
data or any organization's important data. The main problem is to hide sensitive information …

An e-voting-based data gathering scheme for decision support systems

VI Galanis, EK Ikonomakis… - … journal of decision …, 2010 - inderscienceonline.com
In this contribution, a protocol for secure data gathering is introduced that utilises existing e-
voting protocols to gather data records instead of votes. The protocol relies on two distinct …

[PDF][PDF] Recent approaches to electronic data gathering with privacy

EC Laskari, GC Meletiou, MN Vrahatis - Proceedings of the 1st …, 2004 - academia.edu
The spread of database technologies has allowed corporations and scientific organizations
to collect huge amounts of data. Analysis of the contents of these databases can contribute …

[PDF][PDF] Privacy Preserving Technologies: Extended Bibliography

A Mohaisen - ETRI, Korea - Citeseer
[48] B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy,
accuracy, and consistency too: a holistic solution to contingency table release. Proceedings …

[引用][C] Cryptographic Techniques for Secure Linear Computations in the Supply Chain Management

IP Krommyda, GC Meletiou, DS Triantafyllou… - Cryptography, Cyber Security and …

[引用][C] e-αξιολόγηση: εφαρμογές της κρυπτογραφίας στην αξιολόγηση μέσω τεχνολογιών πληροφορικής και επικοινωνιών

Β Γαλάνης - 2009