Search results

    Filter results

  • Full text

  • Document type

  • Publication year

  • Organisation

Results: 18
Number of items: 18
  • van 't Noordende, G. J., Olabarriaga, S. D., Koot, M. R., & de Laat, C. T. A. M. (2011). Trusted data management for Grid-based medical applications. In E. Udoh (Ed.), Cloud, Grid, and High Performance Computing (pp. 208-220). IGI Global. https://doi.org/10.4018/978-1-60960-603-9.ch013
  • Open Access
    Koot, M. R., Mandjes, M., van 't Noordende, G., & de Laat, C. (2011). Efficient probabilistic estimation of quasi-identifier uniqueness. In Proceedings of ICT.OPEN 2011: 14-15 November 2011, Veldhoven, The Netherlands (pp. 119-126). STW Technology Foundation.
  • Open Access
    Koot, M. R., van 't Noordende, G., & de Laat, C. (2010). A study on the re-identifiability of Dutch citizens. In A. Serjantov, & C. Troncoso (Eds.), HotPETs 2010 proceedings (pp. 35-49) http://petsymposium.org/2010/papers/hotpets10-Koot.pdf
  • van 't Noordende, G. J., Olabarriaga, S. D., Koot, M. R., & de Laat, C. T. A. M. (2009). A Trusted Data Storage Infrastructure for Grid-Based Medical Applications. International Journal of Grid and High Performance Computing, 1(2), 1-14. https://doi.org/10.4018/jghpc.2009040101
  • van 't Noordende, G. J., Olabarriaga, S. D., Koot, M. R., & de Laat, C. T. A. M. (2008). A trusted data storage infrastructure for Grid-based medical applications. In T. Priol, L. Lefevre, & R. Buyya (Eds.), CCGRID 2008: Eighth IEEE International Symposium on Cluster Computing and the Grid : proceedings : 19-22 May, 2008, Lyon, France (pp. 627-632). IEEE Computer Society. https://doi.org/10.1109/CCGRID.2008.84
  • Koot, M. (2008). An overview of anonymity and anonymous communication. In Proceedings NLUUG voorjaarsconferentie 2008: Security (pp. 1-12). NLUUG.
  • Open Access
    Koot, M. (2008). Vertrouwen in vrije digitale X.509 certificaten. Informatiebeveiliging, 2008(5), 22-26.
  • Koot, M. R. (2007). E-DRM: Bescherming van informatie binnen en buiten het bedrijf. Informatiebeveiliging, 7, 18-22.
Page 2 of 2