Preserving Privacy in Data Outsourcing More Books Like This

Data and Applications Security and Privacy XXV Data and Applications Security and Privacy XXV
2011
Information and Communications Security Information and Communications Security
2008
Computer Security - ESORICS 2008 Computer Security - ESORICS 2008
2008
Trusted Systems Trusted Systems
2016
Information Security and Cryptology Information Security and Cryptology
2016
Advances in Information and Computer Security Advances in Information and Computer Security
2008
Computer Security -- ESORICS 2009 Computer Security -- ESORICS 2009
2009
Cryptology and Network Security Cryptology and Network Security
2019
Information Security Practice and Experience Information Security Practice and Experience
2008
Advances in Information and Computer Security Advances in Information and Computer Security
2016
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security
2010
Information Security and Privacy Information Security and Privacy
2017
Cryptology and Network Security Cryptology and Network Security
2016
Information Security Practice and Experience Information Security Practice and Experience
2007
Information Security Applications Information Security Applications
2009