Christine M. O'Keefe

According to our database1, Christine M. O'Keefe authored at least 57 papers between 1990 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Assessing privacy risks in population health publications using a checklist-based approach.
JAMIA, 2018

2017
Perturbed robust linear estimating equations for confidentiality protection in remote analysis.
Statistics and Computing, 2017

Anonymization for outputs of population health and health services research conducted via an online data center.
JAMIA, 2017

Disclosure risk reduction for generalized linear model output in a remote analysis system.
Data Knowl. Eng., 2017

2016
Decentralised scheduling with confidentiality protection.
Oper. Res. Lett., 2016

2015
A Bootstrap Mechanism for Response Masking in Remote Analysis Systems.
Decision Sciences, 2015

2014
Applicability of Confidentiality Methods to Personal and Business Data.
Proceedings of the Privacy in Statistical Databases, 2014

Comparison of Two Remote Access Systems Recently Developed and Implemented in Australia.
Proceedings of the Privacy in Statistical Databases, 2014

Privacy and Confidentiality in Service Science and Big Data Analytics.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014

2013
Biomedical data privacy: problems, perspectives, and recent advances.
JAMIA, 2013

2012
Comparison of Remote Analysis with Statistical Disclosure Control for Protecting the Confidentiality of Business Data.
Trans. Data Privacy, 2012

Confidentialising Maps of Mixed Point and Diffuse Spatial Data.
Proceedings of the Privacy in Statistical Databases, 2012

2011
Applicability of Regression-Tree-Based Synthetic Data Methods for Business Data.
Proceedings of the Data Mining Workshops (ICDMW), 2011

2010
Signaling Potential Adverse Drug Reactions from Administrative Health Databases.
IEEE Trans. Knowl. Data Eng., 2010

Mining consequence events in temporal health data.
Intell. Data Anal., 2010

2009
Data Privacy and Patient Consent.
Proceedings of the Encyclopedia of Database Systems, 2009

Regression output from a remote analysis server.
Data Knowl. Eng., 2009

2008
Mining Unexpected Temporal Associations: Applications in Detecting Adverse Drug Reactions.
IEEE Trans. Information Technology in Biomedicine, 2008

Remote access methods for exploratory data analysis and statistical modelling: Privacy-Preserving Analytics®.
Computer Methods and Programs in Biomedicine, 2008

A Remote Analysis Server - What Does Regression Output Look Like?.
Proceedings of the Privacy in Statistical Databases, 2008

2007
Privacy-Preserving Sequential Pattern Release.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

2006
Optimal updating of ideal threshold schemes.
Australasian J. Combinatorics, 2006

Mining Unexpected Associations for Signalling Potential Adverse Drug Reactions from Administrative Health Databases.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006

A Data Network for Health e-Research.
Proceedings of the European Conference on eHealth 2006, 2006

2005
A Decentralised Approach to Electronic Consent and Health Information Access Control.
Journal of Research and Practice in Information Technology, 2005

2004
Optimal Updating of Ideal Threshold Schemes.
IACR Cryptology ePrint Archive, 2004

Spreads of T2(o), alpha-flocks and Ovals.
Des. Codes Cryptography, 2004

Privacy-preserving data linkage protocols.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

A Service Oriented Architecture for a Health Research Data Network.
Proceedings of the 16th International Conference on Scientific and Statistical Database Management (SSDBM 2004), 2004

2003
Providing Anonymity in Unconditionally Secure Secret Sharing Schemes.
Des. Codes Cryptography, 2003

Role and Expression of Consent in Web Services.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

2002
Automorphism Groups of Generalized Quadrangles via an Unusual Action of P L (2, 2Sph).
Eur. J. Comb., 2002

2001
Subquadrangles of Generalized Quadrangles of Order (q2, q), q Even.
J. Comb. Theory, Ser. A, 2001

2000
Quasi-quadrics and related structures.
Australasian J. Combinatorics, 2000

1999
On deriving unitals.
Discrete Mathematics, 1999

Triads, Flocks of Conics and Q.
Des. Codes Cryptography, 1999

On Unitals with Many Baer Sublines.
Des. Codes Cryptography, 1999

1997
Mutually Trusted Authority-Free Secret Sharing Schemes.
J. Cryptology, 1997

Ovals in Translation Hyperovals and Ovoids.
Eur. J. Comb., 1997

1996
Ideal Secret Sharing Schemes with Multiple Secrets.
J. Cryptology, 1996

Images of conics under derivation.
Discrete Mathematics, 1996

Ovoids in PG(3, q): a survey.
Discrete Mathematics, 1996

A Construction for Multisecret Threshold Schemes.
Des. Codes Cryptography, 1996

1995
Ovoids of the quadric Q(2n, q).
Eur. J. Comb., 1995

Key Distribution Patterns Using Minkowski Planes.
Des. Codes Cryptography, 1995

Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract).
Proceedings of the Advances in Cryptology, 1995

1994
Symmetries of Arcs.
J. Comb. Theory, Ser. A, 1994

On Sharing Many Secrets (Extended Abstract).
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Block-transitive, point-imprimitive designs with lambda = 1.
Discrete Mathematics, 1993

Spreads and Group Divisible Designs.
Des. Codes Cryptography, 1993

Applications of finite geometries to information security.
Australasian J. Combinatorics, 1993

Multisecret Threshold Schemes.
Proceedings of the Advances in Cryptology, 1993

1992
Hyperovals in Hall planes.
Eur. J. Comb., 1992

The Block-Transitive, Point-Imprimitive 2-(729, 8, 1) Designs.
Appl. Algebra Eng. Commun. Comput., 1992

A Comparison of Key Distribution Patterns Constructed from Circle Geometries.
Proceedings of the Advances in Cryptology, 1992

1991
Hyperovals in PG(2, 16).
Eur. J. Comb., 1991

1990
Ovals in Desarguesian planes.
Australasian J. Combinatorics, 1990


  Loading...