• MINLPLib

  • Referenced in 80 articles [sw06172]
  • used to transform industrial models that contain confidential information. Such transformations allow many of these...
  • KASUMI

  • Referenced in 20 articles [sw02926]
  • UMTS, KASUMI is used in the confidentiality (f8) and integrity algorithms (f9) with names UEA1...
  • CryptDB

  • Referenced in 15 articles [sw27061]
  • system that provides practical and provable confidentiality in the face of these attacks for applications...
  • sdcMicro

  • Referenced in 9 articles [sw07953]
  • statistical agencies and other institutions are mostly confidential. This package can be used...
  • ConfiChair

  • Referenced in 7 articles [sw13266]
  • cloud”, raising new privacy and confidentiality concerns. We propose a general technique for designing cloud...
  • Flow Caml

  • Referenced in 6 articles [sw08923]
  • automatically check that they obey some confidentiality or integrity policy. In Flow Caml, standard...
  • V-MDAV

  • Referenced in 6 articles [sw11787]
  • approach to obtain ing anonymized versions of confidential microdata. Optimally solving microaggregation on multivariate data...
  • synthpop

  • Referenced in 6 articles [sw17416]
  • producing synthetic versions of microdata containing confidential information so that they are safe...
  • CoSMed

  • Referenced in 3 articles [sw17453]
  • CoSMed: a confidentiality-verified social media platform. This paper describes progress with our agenda ... social media platform with verified document confidentiality. The system’s kernel is implemented and verified...
  • FlowDroid

  • Referenced in 4 articles [sw26741]
  • ubiquitous source of private and confidential data. At the same time, smartphone users are plagued...
  • SCiFI

  • Referenced in 4 articles [sw33595]
  • privacy of the subjects and the confidentiality of the database. A specific application of SCiFI...
  • SCTP

  • Referenced in 2 articles [sw03483]
  • solution for authentication and key agreement; Data confidentiality is provided through encryption and decryption ... offered security differentiation and message overhead. Confidentiality protection of SCTP control information is, however, only...
  • VC3

  • Referenced in 3 articles [sw23078]
  • hyper visor out of the TCB, thus, confidentiality and integrity are preserved even if these...
  • TFRP

  • Referenced in 3 articles [sw37089]
  • techniques is widely used to protect confidentiality in statistical databases released for public...
  • EDSL

  • Referenced in 1 article [sw22616]
  • computing, a client may request computation on confidential data that is sent to untrusted servers ... software must be properly structured to preserve confidentiality. Using a general definition of secure execution ... cryptographic cloud computing and prove correctness and confidentiality for two representative and distinctly different implementations...
  • MARISM-A

  • Referenced in 2 articles [sw02936]
  • providing complex security mechanisms to protect migration, confidentiality and integrity of agents. This is indeed...
  • EFADS

  • Referenced in 2 articles [sw09459]
  • analysis, we demonstrate that EFADS provides data confidentiality and data sharer’s anonymity without requiring...
  • Rmind

  • Referenced in 2 articles [sw21135]
  • practical cryptographic method for processing confidential data. Research progress...
  • MAGERIT

  • Referenced in 2 articles [sw22127]
  • through security measures that guarantee the authenticity, confidentiality, integrity and availability of the information systems...
  • WtdCatmod

  • Referenced in 2 articles [sw26006]
  • unit information has been suppressed for respondent confidentiality. First, the program employs the Macro Language...