7
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Conference Proceedings: not found

      Efficient signature schemes supporting redaction, pseudonymization, and data deidentification

      proceedings-article
      1 , 2 , 2 , 1 , 2 , 1 , 2 , 3
      ACM
      Asia CCS '08: Asia CCS'08 ACM Symposium on Information, Computer and Communications Security (Asia CCS '08)
      18 03 2008 20 03 2008

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Author and article information

          Conference
          ACM
          March 18 2008
          March 18 2008
          March 18 2008
          March 18 2008
          : 353-362
          Affiliations
          [1 ]Hewlett-Packard
          [2 ]Hitachi Ltd.
          [3 ]Rutgers University
          Article
          10.1145/1368310.1368362
          63abaa72-0e90-4fb8-80ba-ad49c1348706
          © 2008
          Asia CCS '08: Asia CCS'08 ACM Symposium on Information, Computer and Communications Security
          Asia CCS '08
          Tokyo Japan
          18 03 2008 20 03 2008
          SIGSAC ACM Special Interest Group on Security, Audit, and Control
          History

          Quantitative & Systems biology,Biophysics
          Quantitative & Systems biology, Biophysics

          Comments

          Comment on this article