Han Security Limitations of Using Secret Sharing for Data Outsourcing, p.145 ,
161 Danish Mehmood, p.177 ,
Fitzgerald Code Type Revealing Using Experiments Framework ,
Bhukya k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing, p.263 ,
Mohammad Ali Hadavi, and Rasool Jalili Table of Contents XIII Reconstruction Attack through Classifier Analysis, p.274 ,
and Michel Hurfin Cloud Computing Distributed Data Federation without Disclosure of User Existence, p.282 ,