Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Vaidya, Jaideep
add a person with the name Vaidya, Jaideep
 

Other publications of authors with the same name

Privacy-preserving Collaborative Filtering for the Cloud., , , and . CloudCom, page 223-230. IEEE Computer Society, (2011)CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud., , , , , , , and . CloudCom, page 731-734. IEEE Computer Society, (2014)Privacy-Preserving Outlier Detection., and . ICDM, page 233-240. IEEE Computer Society, (2004)Preserving Privacy in Social Networks: A Structure-Aware Approach., , , , and . Web Intelligence, page 647-654. IEEE Computer Society, (2009)Search Engine Query Clustering Using Top-k Search Results., , and . Web Intelligence, page 112-119. IEEE Computer Society, (2011)UICDS compliant resource management system for emergency response., , , and . DG.O, page 23-31. Digital Government Research Center, (2010)Privacy Preserving Naïve Bayes Classifier for Vertically Partitioned Data., and . SDM, page 522-526. SIAM, (2004)Security analysis of temporal RBAC under an administrative model., , , and . Computers & Security, (2014)The generalized temporal role mining problem., , , and . Journal of Computer Security, 23 (1): 31-58 (2015)Efficient security policy enforcement for the mobile environment., , and . Journal of Computer Security, 16 (4): 439-475 (2008)