To search, Click below search items.
All Published Papers Search Service
Title
Privacy-Preserving Mining of Association Rules on Distributed Databases
Author
Chin-Chen Chang, Jieh-Shan Yeh, Yu-Chiang Li
Vol. 6 No. 11 pp. 259-266
Keywords
data mining, frequent itemset, privacy-preserving, security
An Efficient Attack-Resistant Trust Model for P2P Networks
Chunqi Tian, Shihong Zou, Wendong Wang, Shiduan Cheng
Vol. 6 No. 11 pp. 251-258
Peer-to-Peer, trust, credibility, local trust value.
DTD Level authorization in XML documents with usage control
Lili Sun, Li
Vol. 6 No. 11 pp. 244-250
XML documents, the Document Type Definition(DTD), Usage control, Authorization
An Improved Deniable Authentication Protocol
Chia-Chen Lin, Chin-Chen Chang
Vol. 6 No. 11 pp. 240-243
Deniable authentication, mutual authentication, PIM attack.