Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
2009 | An empirical study on privacy and secure multi-party computation using exponentiation | Wang, I. -C.; Shen, C. -H.; Chen, K.; Hsu, T. -s.; Liau, C. -J.; Wang, D. -W. | | | | |
2013 | Floating point arithmetic protocols for constructing secure data analysis application | Liu, Y. -C.; Chiang, Y. -T.; Hsu, T. -s.; Liau, C. -J.; Wang, D. -W. | | | | |
2002 | How much privacy? - A system to safe guard personal privacy while releasing database | Chiang, Y. T.; Chiang, Y. C.; Hsu, T. -s.; Liau, C. -J.; Wang, D. W. | | | | |
2002 | How Much Privacy? -- a System to Safe guard Personal Privacy While Releasing Databases | Chiang, Y. -T.; Chiang, Y. -C.; Hsu, T. -S.; Liau, C. -J.; Wang, D. -W. | | | | |
2002 | Quantifying Privacy Leakage Through Answering Database Queries | Hsu, T. -S.; Liau, C. -J.; Wang, D. -W.; Chen, Jeremy K. -P. | | | | |