Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
Data masking
Known as:
Dynamic data masking
Data masking or data obfuscation is the process of hiding original data with random characters or data. The main reason for applying masking to a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Adaptive Redaction
Allway sync
Cloud computing security
Continuous delivery
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases
Andreas Reiter
,
Bernd Prünster
,
Thomas Zefferer
IEEE/ACM International Symposium on Cluster…
2017
Corpus ID: 25141976
Many different technologies fostering and supporting distributed and decentralized computing scenarios emerged recently. Edge…
Expand
Review
2017
Review
2017
Malicious JavaScript detection using machine learning
Olof Mogren
2017
Corpus ID: 8990012
JavaScript has become a ubiquitous Web technology that enables interactive and dynamic Web sites. The widespread adoption, along…
Expand
2016
2016
Reconstructing rated items from perturbed data
B. D. Okkalioglu
,
M. Koc
,
H. Polat
Neurocomputing
2016
Corpus ID: 2888181
2016
2016
Reducing control bit overhead for X-masking/X-canceling hybrid architecture via pattern partitioning
Jina Kang
,
N. Touba
,
Joon-Sung Yang
Design Automation Conference
2016
Corpus ID: 16469276
An X-masking scheme prevents unknown (X) values from shifting into an output response compactor, whereas an X-canceling MISR…
Expand
2013
2013
Data Masking Generic Model
Min Li
,
Zheli Liu
,
Chunfu Jia
,
Zongqing Dong
Fourth International Conference on Emerging…
2013
Corpus ID: 18080415
Based on the analysis of the process of data masking, the formal definition of data masking was presented and a generic data…
Expand
Highly Cited
2011
Highly Cited
2011
3D-DCT based perceptual quality assessment of stereo video
Lina Jin
,
A. Boev
,
A. Gotchev
,
K. Egiazarian
18th IEEE International Conference on Image…
2011
Corpus ID: 1723385
In this paper, we present a novel stereoscopic video quality assessment method based on 3D-DCT transform. In our approach…
Expand
2009
2009
Radical Reference: Socially Responsible Librarianship Collaborating With Community
M. Morrone
,
Lia Friedman
2009
Corpus ID: 145245941
To date, the written record of socially responsible librarianship chiefly concerns outreach to previously-disregarded…
Expand
2007
2007
Security of Data Warehousing Server
Kimmo Palletvuori
2007
Corpus ID: 16840752
The aim is to study the data warehouse specific security needs which means focusing on the long life cycle of the data and the…
Expand
2005
2005
Analyzing Memory Accesses in Obfuscated x86 Executables
Michael Venable
,
Mohamed R. Chouchane
,
M. E. Karim
,
Arun Lakhotia
International Conference on Detection of…
2005
Corpus ID: 8223353
Programmers obfuscate their code to defeat manual or automated analysis. Obfuscations are often used to hide malicious behavior…
Expand
2005
2005
Confidentiality and Disclosure Limitation
S. Fienberg
2005
Corpus ID: 6348040
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE