Filter your results
- 14
- 14
- 14
- 4
- 2
- 1
- 1
- 1
- 2
- 5
- 1
- 1
- 14
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Guaranteeing Correctness of Bulk Operations in Outsourced Databases30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.37-51, ⟨10.1007/978-3-319-41483-6_3⟩
Conference papers
hal-01633666v1
|
||
|
Integrity of Electronic Patient Records10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.378-391, ⟨10.1007/978-3-642-22878-0_32⟩
Conference papers
hal-01589094v1
|
||
|
Anonygator: Privacy and Integrity Preserving Data AggregationACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.85-106, ⟨10.1007/978-3-642-16955-7_5⟩
Conference papers
hal-01055270v1
|
||
|
Using Data Analytics to Detect Possible Collusion in a Multiple Choice Quiz Test20th Conference on e-Business, e-Services and e-Society (I3E), Sep 2021, Galway, Ireland. pp.757-762, ⟨10.1007/978-3-030-85447-8_63⟩
Conference papers
hal-03648132v1
|
||
|
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.101-110, ⟨10.1007/978-3-642-36818-9_11⟩
Conference papers
hal-01480224v1
|
||
|
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Conference papers
hal-01480187v1
|
||
|
Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG Images2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.643-652, ⟨10.1007/978-3-642-55032-4_66⟩
Conference papers
hal-01397282v1
|
||
|
ASPAS: As Secure as Possible Available Systems21th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2021, Valletta, Malta. pp.57-73, ⟨10.1007/978-3-030-78198-9_4⟩
Conference papers
hal-03384864v1
|
||
|
Result Integrity Verification of Outsourced Frequent Itemset Mining27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.258-265, ⟨10.1007/978-3-642-39256-6_17⟩
Conference papers
hal-01490709v1
|
||
|
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.311-324, ⟨10.1007/978-3-319-61176-1_17⟩
Conference papers
hal-01684361v1
|
||
|
Integrity Assurance for Outsourced Databases without DBMS Modification28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.1-16, ⟨10.1007/978-3-662-43936-4_1⟩
Conference papers
hal-01284838v1
|
||
|
Data Integrity Verification in Column-Oriented NoSQL Databases32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.165-181, ⟨10.1007/978-3-319-95729-6_11⟩
Conference papers
hal-01954409v1
|
||
|
Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.305-328, ⟨10.1007/978-3-642-41148-9_21⟩
Conference papers
hal-01460630v1
|
||
|
Assured Cloud-Based Data Analysis with ClusterBFT14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.82-102, ⟨10.1007/978-3-642-45065-5_5⟩
Conference papers
hal-01480793v1
|