2019
DOI: 10.1007/s10115-019-01424-4
|View full text |Cite
|
Sign up to set email alerts
|

Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…A brief report summarizes the research conducted by several scientists in the field of sickness prognosis. According to [9], the primary goal of the data security model is to detect attacks in the rail transportation sector. An expert attack detection system known as the BAS was developed to detect assaults and reduce their impact on the subway's environment control subsystem.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…A brief report summarizes the research conducted by several scientists in the field of sickness prognosis. According to [9], the primary goal of the data security model is to detect attacks in the rail transportation sector. An expert attack detection system known as the BAS was developed to detect assaults and reduce their impact on the subway's environment control subsystem.…”
Section: Literature Reviewmentioning
confidence: 99%
“…s , σ (b) the auditor verifies the correctness of ρ (b) . It verified the indices and coefficients by the value with T as using the equation: Third, the auditor verifies the proof ρ (b) by checking the following equation: (9) The auditor verifies that the challenged data blocks are intact if the equation holds. Auditor saves a log entry to document their auditing of the data: A random is chosen by the client from the subset B of indices of Bitcoin blocks and transmitted to the auditor.…”
Section: Store Protocolmentioning
confidence: 99%