• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 38,201
Next 10 →

Table 1. Security Analysis of the Protocols

in Evaluation of GSM Security
by Basar Kasim, Levent Ertaul 2000
Cited by 1

TABLE I Security Analysis of Protocol I

in Privacy Preserving Association Rule Mining in Vertically Partitioned Data
by Jaideep Vaidya 2002
Cited by 126

TABLE II Security Analysis of Protocol II

in Privacy Preserving Association Rule Mining in Vertically Partitioned Data
by Jaideep Vaidya 2002
Cited by 126

Table 4.2 Security Analysis of Protocol

in Privacy Preserving Data Mining over Vertically Partitioned Data
by Jaideep S. Vaidya

Table 1: Security Analysis of Protocols Protected Number of Total number Number of

in Privacy Preserving Association Rule Mining in Vertically Partitioned Data
by Jaideep Vaidya, Chris Clifton 2002
"... In PAGE 9: ... Therefore, the disclosure risk in this method is based on the number of data values that the other party might know from some external source. Table1 presents the number of unknowns and equations generated for protocols I and II. Two rows are given for each protocol/party: One for the basic protocol, and one for the additional step needed to protect boolean values as described in Section 5.... ..."
Cited by 126

Table 1: Security Analysis of Protocol Protected Number of Total number Number of

in Privacy Preserving Association Rule Mining in Vertically Partitioned Data
by Jaideep Vaidya, Chris Clifton 2002
Cited by 126

Table 1: Analysis of Provably Secure Group Key Exchange Protocols Protocol Model(s) Assumption(s) Corr. S/D

in Security-Focused Survey on Group Key Exchange Protocols
by Mark Manulis 2006
Cited by 1

Table 1: Analysis of Security Models for Group Key Exchange Protocols Model IND MA FS CON Strong Corr. S/D

in Survey on Security Requirements and Models for Group Key Exchange
by Mark Manulis 2006
Cited by 2

Table 1: Analysis of Security Models for Group Key Exchange Protocols Model IND MA FS CON Strong Corr. S/D

in Survey on Security Requirements and Models for Group Key Exchange
by Mark Manulis 2006
Cited by 2

Table 1: Analysis of Security Models for Group Key Exchange Protocols Model IND MA FS CON Strong Corr. S/D

in Survey on Security Requirements and Models for Group Key Exchange
by Mark Manulis 2006
Cited by 2
Next 10 →
Results 1 - 10 of 38,201
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University