Analysis of Different Utility Mining Methodologies in Transactional Databases
by: Divvela.SrinivasaRao and Dr.V.Sucharita
DOI: http://dx.doi.org/10.21742/ijbdsi.2016.3.1.01
Dynamic Authentication for Privacy Preserving Data
by: Ravi Kumar T and Y Praveen Kumar
DOI: http://dx.doi.org/10.21742/ijbdsi.2016.3.1.02