Data masking

Known as: Dynamic data masking 
Data masking or data obfuscation is the process of hiding original data with random characters or data. The main reason for applying masking to a… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1972-2018
0519722018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
In today's information era, the data is a key asset for any organization. Every organization has a privacy policy for hiding… (More)
  • figure 1
  • figure 4
  • figure 2
Is this relevant?
2011
2011
Data Warehouses (DWs) are the enterprise's most valuable asset in what concerns critical business information, making them an… (More)
  • table 1
  • figure 1
  • table 2
  • table 4
  • table 6
Is this relevant?
2011
2011
We study the problem of generating synthetic databases having declaratively specified characteristics. This problem is motivated… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 6
  • figure 7
Is this relevant?
2010
2010
Clustering-based data masking approaches are widely used for privacy-preserving data sharing and data mining. Existing approaches… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2009
2009
Handling of confidential and sensitive data is an important issue facing any professional service provider that wishes to use… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
Side channel attacks are becoming a major threat to the security of embedded systems. Countermeasures proposed to overcome Simple… (More)
  • figure 2
  • figure 3
  • figure 1
  • figure 4
  • figure 5
Is this relevant?
2005
2005
It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Low power consumption, low gate count and high throughput used to be standard design criteria for cryptographic coprocessors… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2002
2002
It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Estimation of noise contained within a remote sensing image is essential in order to counter the effects of noise contamination… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?