Attack on Privacy
Insider Collusion Attack on Privacy-Preserving Data Mining System by Non Homomorphic Encryption Methods
7
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet
11
Privacy Preserving Technique for Insider Collusion Attack on Text and Image File Based on Fake Data
5
Survey on Privacy Preserving of Kernel-Based Data Mining Systems from Insider Collusion Attack
5
Comparison of K automorphism and K2 degree Anonymization for Privacy Preserving in Social Network
7
A Survey on Packet Drop Attack Detection and Privacy Management for Confidential Multihop Communication in Wireless Network
5
Traceability Improvements of a New RFID Protocol Based On EPC C1G2
7
An Accuracy-Assured Privacy-Preserving Recommender System for Internet Commerce
20
Privacy Preservation of Social Network Data against Structural Attack using K-Auto restructure
7
Efficient and Privacy Preserving Protocol against Insider Attack for Data Storage in Cloud Computing
10
Location Privacy and Node Compromise Attack in Wireless Sensor Networks under Global Eavesdropper
7
PACKET DROP ATTACK DETECTION AND PRIVACY MANAGEMENT FOR CONFIDENTIAL MULTIHOP COMMUNICATION IN WIRELESS NETWORK
5
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
50
Comparative Survey of Routing Attacks in WSN’s
8
ASSESSING LEARNING PARADIGMS IN TEXT CLASSIFICATION
16
A Review on Insider Attack Detection Algorithm Using Data Mining Techniques
5
Insider Collusion Attack on Text File Using Privacy-Preserving Kernel Based System
6
Effective Throughput Based Approaches in Avoiding Selective Jamming Attack by Achieving Privacy in Wireless Networks
8
Protecting source location privacy against wormhole attack using dawn in wireless sensor networks
6
SQL Injection Attack
9