Protecting Privacy in Data Release More Books Like This

Guide to Data Privacy Guide to Data Privacy
2022
Information and Communications Security Information and Communications Security
2008
Information Security Practice and Experience Information Security Practice and Experience
2007
Algorithms for Data and Computation Privacy Algorithms for Data and Computation Privacy
2020
Information Security and Cryptology Information Security and Cryptology
2016
Cryptology and Network Security Cryptology and Network Security
2019
Information Security and Cryptology – ICISC 2018 Information Security and Cryptology – ICISC 2018
2019
Progress in Cryptology - AFRICACRYPT 2017 Progress in Cryptology - AFRICACRYPT 2017
2017
Advances in Information and Computer Security Advances in Information and Computer Security
2016
Information Security Information Security
2018
Applied Cryptography and Network Security Applied Cryptography and Network Security
2016
Information Security and Cryptology -- ICISC 2013 Information Security and Cryptology -- ICISC 2013
2014
Information Security Practice and Experience Information Security Practice and Experience
2021
Topics in Cryptology – CT-RSA 2019 Topics in Cryptology – CT-RSA 2019
2019
Information Security and Cryptology - ICISC 2015 Information Security and Cryptology - ICISC 2015
2016