[1]
|
Research Anthology on Privatizing and Securing Data
2021
DOI:10.4018/978-1-7998-8954-0.ch019
|
|
|
[2]
|
An End to End Cloud Computing Privacy Framework Using Blind Processing
International Journal of Smart Security Technologies,
2020
DOI:10.4018/IJSST.2020010101
|
|
|
[3]
|
A Secure Multi-User Database-as-a-Service Approach for Cloud Computing Privacy
Procedia Computer Science,
2019
DOI:10.1016/j.procs.2019.11.006
|
|
|
[4]
|
Constraint-Based Privacy Preserving-Path Computation Element
International Journal of Smart Security Technologies,
2019
DOI:10.4018/IJSST.2019070101
|
|
|
[5]
|
Cyber Security and Threats
2018
DOI:10.4018/978-1-5225-5634-3.ch039
|
|
|
[6]
|
Privacy-Preserving Location-Based Services by using Intel SGX
Proceedings of the First International Workshop on Human-centered Sensing, Networking, and Systems - HumanSys'17,
2017
DOI:10.1145/3144730.3144739
|
|
|
[7]
|
Privacy-Preserving Location-Based Services by using Intel SGX
Proceedings of the First International Workshop on Human-centered Sensing, Networking, and Systems,
2017
DOI:10.1145/3144730.3144739
|
|
|
[8]
|
Improving Information Security Practices through Computational Intelligence
Advances in Information Security, Privacy, and Ethics,
2016
DOI:10.4018/978-1-4666-9426-2.ch007
|
|
|
[9]
|
Blind decryption for cloud computing
2016 IEEE Symposium on Computers and Communication (ISCC),
2016
DOI:10.1109/ISCC.2016.7543875
|
|
|
[10]
|
A Step towards User Privacy while Using Location-Based Services
Journal of Information Processing Systems,
2014
DOI:10.3745/JIPS.01.0003
|
|
|
[11]
|
Dummy Based Privacy Preservation in Continuous Querying Road Network Services
2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery,
2014
DOI:10.1109/CyberC.2014.24
|
|
|