Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,468,978 papers from all fields of science
Search
Sign In
Create Free Account
Data masking
Known as:
Dynamic data masking
Data masking or data obfuscation is the process of hiding original data with random characters or data. The main reason for applying masking to a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Adaptive Redaction
Allway sync
Cloud computing security
Continuous delivery
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
An efficient data masking for securing medical data using DNA encoding and chaotic system
S. K
,
R. K.
International Journal of Electrical and Computer…
2020
Corpus ID: 221756115
Data security is utmost important for ubiquitous computing of medical/diagnostic data or images. Along with must consider…
Expand
Review
2017
Review
2017
Malicious JavaScript detection using machine learning
Olof Mogren
2017
Corpus ID: 8990012
JavaScript has become a ubiquitous Web technology that enables interactive and dynamic Web sites. The widespread adoption, along…
Expand
2017
2017
Privacy aware web services in the cloud
Farshad Rahimi Asl
,
Fei Chiang
,
Wenbo He
,
Reza Samavi
IEEE Conference on Communications and Network…
2017
Corpus ID: 26029871
Data privacy and security continues to hinder wider adoption of cloud based web services for small to medium businesses. Existing…
Expand
2017
2017
Detecting scanning computer worms using machine learning and darkspace network traffic
J. Orero
,
Nelson Ochieng
,
M. Waweru
,
A. Ismail
2017
Corpus ID: 196082820
The subject of this paper is computer worm detection in a network. Computers worms have been defined as a process that can cause…
Expand
2013
2013
Dynamic Runtime Methods to Enhance Private Key Blinding
Karine Gandolfi-Villegas
,
Nabil Hamzi
IACR Cryptology ePrint Archive
2013
Corpus ID: 7719553
In this paper we propose new methods to blind exponents used in RSA and in elliptic curves based algorithms. Due to classical…
Expand
2008
2008
A Theoretical Comparison of Data Masking Techniques for Numerical Microdata
Krish Muralidhar Gatton
2008
Corpus ID: 45251486
In this study, we perform a comprehensive theoretical evaluation of masking techniques for numerical microdata. The objective of…
Expand
2007
2007
Security of Data Warehousing Server
Kimmo Palletvuori
2007
Corpus ID: 16840752
The aim is to study the data warehouse specific security needs which means focusing on the long life cycle of the data and the…
Expand
2006
2006
Analyse et traitement des images codées en polarisation
Samia Ainouz
2006
Corpus ID: 170501003
Ce travail concerne les developpements necessaires a la mise en oeuvre efficace de systemes imageurs polarimetriques et comporte…
Expand
1958
1958
Possible improvement of protective masks and filters against radioactive dusts
Robert Po
1958
Corpus ID: 184056858
1938
1938
Dust Masks and Filters.
G. Hass
1938
Corpus ID: 114089684
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE