Information Security 1 Information Security: Lecture no 7 Jeffy Mwakalinga.
Government Access To Private Databases By Kathleen Isley and John D’Alessandro.
Design of Health Technologies lecture 20 John Canny 11/21/05.
Secure Multiparty Computation – Basic Cryptographic Methods Li Xiong CS573 Data Privacy and Security.
Chapter 20 - Third-Party Records and Data Mining Part I.