Secure Hamming distance based record linkage with malicious adversaries (English)
- New search for: Zhang, Bo
- New search for: Cheng, Rong
- New search for: Zhang, Fangguo
- New search for: Zhang, Bo
- New search for: Cheng, Rong
- New search for: Zhang, Fangguo
In:
Computers and Electrical Engineering
;
40
, 6
;
1906-1916
;
2014
-
ISSN:
- Article (Journal) / Print
-
Title:Secure Hamming distance based record linkage with malicious adversaries
-
Contributors:
-
Published in:Computers and Electrical Engineering ; 40, 6 ; 1906-1916
-
Publisher:
-
Publication date:2014
-
Size:11 Seiten, 28 Quellen
-
ISSN:
-
Coden:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 40, Issue 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1789
-
An efficient and scalable plagiarism checking system using Bloom filtersGeravand, Shahabeddin / Ahmadi, Mahmood et al. | 2014
- 1801
-
A survey of traffic-based routing metrics in family of expected transmission count for self-organizing networksShi, Fei / Jin, Dongxu / Song, Jooseok et al. | 2014
- 1813
-
Underground distribution BPL connections with (N+1)-hop repeater systems: A novel capacity mitigation techniqueLazaropoulos, Athanasios G. et al. | 2014
- 1827
-
Behavioral-model-based freehand tracking in a Selection-Move-Release systemFeng, Zhiquan / Yang, Bo / Tang, Haokui / Lv, Na / Meng, Qingfang / Yin, Jianqin / Feng, Shichang et al. | 2014
- 1838
-
Design and verification of an efficient WISHBONE-based network interface for network on chipSwaminathan, K. / Lakshminarayanan, G. / Ko, Seok-Bum et al. | 2014
- 1858
-
Communication storage optimization for static dataflow with access patterns under periodic scheduling and throughput constraintWang, G.Q. / Allen, R. / Andrade, H.A. / Sangiovanni-Vincentelli, A. et al. | 2014
- 1874
-
Diffusion wavelet-based analysis on traffic matrices by different diffusion operatorsTian, Hui / Zhong, Binze / Shen, Hong et al. | 2014
- 1883
-
An effective approach to offline Arabic handwriting recognitionAl Abodi, Jafaar / Li, Xue et al. | 2014
- 1903
-
Introduction to the special issue on Recent advances in security and privacy in distributed communications (third edition)Perez, Gregorio Martinez / Alcaraz Calero, Jose M. / Marmol, Felix Gomez et al. | 2014
- 1906
-
Secure Hamming distance based record linkage with malicious adversariesZhang, Bo / Cheng, Rong / Zhang, Fangguo et al. | 2013
- 1917
-
Dynamic stochastic resonance-based improved logo extraction in discrete cosine transform domainJha, Rajib Kumar / Chouhan, Rajlaxmi / Aizawa, Kiyoharu et al. | 2013
- 1930
-
A novel fuzzy identity based signature scheme based on the short integer solution problemYao, Yanqing / Li, Zhoujun et al. | 2013
- 1940
-
Defeating buffer overflow attacks via virtualizationTian, Donghai / Xiong, Xi / Hu, Changzhen / Liu, Peng et al. | 2013
- 1951
-
Detecting copy-move forgery under affine transforms for image forensicsLi, Leida / Li, Shushang / Zhu, Hancheng / Wu, Xiaoyue et al. | 2013
- 1963
-
Efficient forward secure identity-based shorter signature from latticeZhang, Xiaojun / Xu, Chunxiang / Jin, Chunhua / Xie, Run et al. | 2013
- 1972
-
Efficient group Diffie–Hellman key agreement protocolsHarn, Lein / Lin, Changlu et al. | 2014
- 1981
-
Collaborative trust aware intelligent intrusion detection in VANETsKumar, Neeraj / Chilamkurti, Naveen et al. | 2014
- 1997
-
An improved remote user authentication scheme with key agreementKumari, Saru / Khan, Muhammad Khurram / Li, Xiong et al. | 2014
- 2013
-
Defense against SYN flooding attacks: A particle swarm optimization approachJamali, Shahram / Shaker, Vahid et al. | 2014
- IFC
-
Editorial Board| 2014