|
Richard J. Lipton:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Dorothy E. Denning:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Which papers of Dorothy E. Denning cite Richard J. LiptonOrdered by citing publication[Change the order to 'ordered by cited']
-
Dorothy E. Denning
A Security Model for the Statistical Database Problem. [Citation Graph (4, 17)][DBLP] SSDBM, 1983, pp:368-390 [Conf] Cites:
-
David P. Dobkin, Anita K. Jones, Richard J. Lipton
Secure Databases: Protection Against User Influence. [Citation Graph (27, 7)][DBLP] ACM Trans. Database Syst., 1979, v:4, n:1, pp:97-106 [Journal]
-
Richard A. DeMillo, David P. Dobkin, Richard J. Lipton
Even Data Bases That Lie Can Be Compromised. [Citation Graph (14, 0)][DBLP] IEEE Trans. Software Eng., 1978, v:4, n:1, pp:73-75 [Journal]
-
Dorothy E. Denning
Secure Statistical Databases with Random Sample Queries. [Citation Graph (21, 12)][DBLP] ACM Trans. Database Syst., 1980, v:5, n:3, pp:291-315 [Journal] Cites:
-
David P. Dobkin, Anita K. Jones, Richard J. Lipton
Secure Databases: Protection Against User Influence. [Citation Graph (27, 7)][DBLP] ACM Trans. Database Syst., 1979, v:4, n:1, pp:97-106 [Journal]
-
Richard A. DeMillo, David P. Dobkin, Richard J. Lipton
Even Data Bases That Lie Can Be Compromised. [Citation Graph (14, 0)][DBLP] IEEE Trans. Software Eng., 1978, v:4, n:1, pp:73-75 [Journal]
-
Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz
The Tracker: A Threat to Statistical Database Security. [Citation Graph (29, 10)][DBLP] ACM Trans. Database Syst., 1979, v:4, n:1, pp:76-96 [Journal] Cites:
-
Dorothy E. Denning, Jan Schlörer
A Fast Procedure for Finding a Tracker in a Statistical Database. [Citation Graph (13, 7)][DBLP] ACM Trans. Database Syst., 1980, v:5, n:1, pp:88-102 [Journal] Cites:
-
David P. Dobkin, Anita K. Jones, Richard J. Lipton
Secure Databases: Protection Against User Influence. [Citation Graph (27, 7)][DBLP] ACM Trans. Database Syst., 1979, v:4, n:1, pp:97-106 [Journal]
-
Richard A. DeMillo, David P. Dobkin, Richard J. Lipton
Even Data Bases That Lie Can Be Compromised. [Citation Graph (14, 0)][DBLP] IEEE Trans. Software Eng., 1978, v:4, n:1, pp:73-75 [Journal]
-
Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning
Linear Queries in Statistical Databases. [Citation Graph (12, 6)][DBLP] ACM Trans. Database Syst., 1979, v:4, n:2, pp:156-167 [Journal] Cites:
-
David P. Dobkin, Anita K. Jones, Richard J. Lipton
Secure Databases: Protection Against User Influence. [Citation Graph (27, 7)][DBLP] ACM Trans. Database Syst., 1979, v:4, n:1, pp:97-106 [Journal]
-
Richard A. DeMillo, David P. Dobkin, Richard J. Lipton
Even Data Bases That Lie Can Be Compromised. [Citation Graph (14, 0)][DBLP] IEEE Trans. Software Eng., 1978, v:4, n:1, pp:73-75 [Journal]
|