Publication not explained
This publication has not yet been explained in plain language by the author(s). However, you can still read the publication.
If you are one of the authors, claim this publication so you can create a plain language summary to help more people find, understand and use it.
Read the Original
This page is a summary of: Security Information Hiding in Data Mining on the bases of Privacy Preserving Technique, International Journal of Computer Applications, February 2010, Foundation of Computer Science, DOI: 10.5120/324-492.
You can read the full text:
Be the first to contribute to this page