R. Nix, M. Kantarcioglu, and J. Keesook, Han Security Limitations of Using Secret Sharing for Data Outsourcing, p.145

L. Jonathan, C. V. Dautrich, and .. Ravishankar-privacy-preserving-subgraph-discovery, 161 Danish Mehmood, p.177

N. Simon, . Foley, and M. William, Fitzgerald Code Type Revealing Using Experiments Framework

H. Saljooghinejad, W. Naik, and .. , Bhukya k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing, p.263

A. Taheri-soodejani and .. , Mohammad Ali Hadavi, and Rasool Jalili Table of Contents XIII Reconstruction Attack through Classifier Analysis, p.274

S. Gambs and A. Gmati, and Michel Hurfin Cloud Computing Distributed Data Federation without Disclosure of User Existence, p.282