|
David P. Dobkin:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Jan Schlörer:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Which papers of Jan Schlörer cite David P. DobkinOrdered by citing publication[Change the order to 'ordered by cited']
-
Dorothy E. Denning, Jan Schlörer
A Fast Procedure for Finding a Tracker in a Statistical Database. [Citation Graph (13, 7)][DBLP] ACM Trans. Database Syst., 1980, v:5, n:1, pp:88-102 [Journal] Cites:
-
David P. Dobkin, Anita K. Jones, Richard J. Lipton
Secure Databases: Protection Against User Influence. [Citation Graph (27, 7)][DBLP] ACM Trans. Database Syst., 1979, v:4, n:1, pp:97-106 [Journal]
-
Richard A. DeMillo, David P. Dobkin, Richard J. Lipton
Even Data Bases That Lie Can Be Compromised. [Citation Graph (14, 0)][DBLP] IEEE Trans. Software Eng., 1978, v:4, n:1, pp:73-75 [Journal]
-
Jan Schlörer
Disclosure from Statistical Databases: Quantitative Aspects of Trackers. [Citation Graph (17, 8)][DBLP] ACM Trans. Database Syst., 1980, v:5, n:4, pp:467-492 [Journal] Cites:
|