Cryptographic Technology for Benefiting from Big Data (Q3454995): Difference between revisions
From MaRDI portal
Set OpenAlex properties. |
ReferenceBot (talk | contribs) Changed an Item |
||
Property / cites work | |||
Property / cites work: Elliptic Curve Cryptosystems / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A public key system with signature and master key functions / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: An application of algebraic geometry to encryption: tame transformation method / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: The tame and the wild automorphisms of polynomial rings in three variables / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY / rank | |||
Normal rank |
Latest revision as of 03:17, 11 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Cryptographic Technology for Benefiting from Big Data |
scientific article |
Statements
Cryptographic Technology for Benefiting from Big Data (English)
0 references
3 December 2015
0 references
big data
0 references
cloud computing
0 references
security
0 references
privacy
0 references
cryptography
0 references
anonymization
0 references