Cryptographic Technology for Benefiting from Big Data
From MaRDI portal
Publication:3454995
DOI10.1007/978-4-431-54907-9_6zbMath1326.94096OpenAlexW40846574MaRDI QIDQ3454995
Keisuke Hakuta, Hisayoshi Sato
Publication date: 3 December 2015
Published in: The Impact of Applications on Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-4-431-54907-9_6
Classification and discrimination; cluster analysis (statistical aspects) (62H30) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) History of mathematics in the 21st century (01A61) History of information and communication theory (94-03)
Cites Work
- An application of algebraic geometry to encryption: tame transformation method
- Elliptic Curve Cryptosystems
- A method for obtaining digital signatures and public-key cryptosystems
- A public key system with signature and master key functions
- The tame and the wild automorphisms of polynomial rings in three variables
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY
This page was built for publication: Cryptographic Technology for Benefiting from Big Data