![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Protocol
Fabrication of Multilayer Microfluidic Arrays for Passive, Efficient DNA Trap** and Profiling
Trace amounts of cell-free DNA containing cancer-specific biomarkers can be found in blood plasma. Detection of these biomarkers holds tremendous potential for applications such as noninvasive cancer diagnosti...
-
Reference Work Entry In depth
Data Privacy and Patient Consent
-
Article
Perturbed robust linear estimating equations for confidentiality protection in remote analysis
National statistical agencies and other data custodians collect and hold a vast amount of survey and census data, containing information vital for research and policy analysis. However, the problem of allowing...
-
Living Reference Work Entry In depth
Data Privacy and Patient Consent
-
Chapter and Conference Paper
Privacy and Confidentiality in Service Science and Big Data Analytics
Vast amounts of data are now being collected from census and surveys, scientific research, instruments, observation of consumer and internet activities, and sensors of many kinds. These data hold a wealth of i...
-
Chapter and Conference Paper
Comparison of Two Remote Access Systems Recently Developed and Implemented in Australia
National Statistical Agencies and other data custodians are vital sources of data for research and policy analysis. However, external researchers must be provided with access to data in such a way that privacy...
-
Chapter and Conference Paper
Applicability of Confidentiality Methods to Personal and Business Data
National Statistical Agencies and other data custodians have a responsibility to protect the confidentiality of commercially sensitive business data as well as personally private social and survey data. Howeve...
-
Article
Open AccessData linkage infrastructure for cross-jurisdictional health-related research in Australia
The Centre for Data Linkage (CDL) has been established to enable national and cross-jurisdictional health-related research in Australia. It has been funded through the Population Health Research Network (PHRN)...
-
Chapter and Conference Paper
Confidentialising Maps of Mixed Point and Diffuse Spatial Data
In this paper we provide an introduction to the area of disseminating spatial data through maps, including an overview of confidentialisation techniques. To date, published methods have focussed on confidentia...
-
Reference Work Entry In depth
Data Privacy and Patient Consent
-
Chapter and Conference Paper
A Remote Analysis Server - What Does Regression Output Look Like?
This paper is concerned with the problem of balancing the competing objectives of allowing statistical analysis of confidential data while maintaining standards of privacy and confidentiality. Remote analysis ser...
-
Chapter and Conference Paper
Privacy-Preserving Sequential Pattern Release
We investigate situations where releasing frequent sequential patterns can compromise individual’s privacy. We propose two concrete objectives for privacy protection: k-anonymity and α-dissociation. The first add...
-
Chapter and Conference Paper
Mining Unexpected Associations for Signalling Potential Adverse Drug Reactions from Administrative Health Databases
Adverse reactions to drugs are a leading cause of hospitalisation and death worldwide. Most post-marketing Adverse Drug Reaction (ADR) detection techniques analyse spontaneous ADR reports which underestimate A...
-
Article
Partial Flocks of Non-Singular Quadrics in PG(2r + 1, q)
We generalise the definition and many properties of partial flocks of non-singular quadrics in PG(3, q) to partial flocks of non-singular quadrics in PG(2r + 1, q).
-
Article
Geometrical contributions to secret sharing theory
Finite geometry has found applications in many different fields and practical environments. We consider one such application, to the theory of secret sharing, where finite projective geometry has proved to b...
-
Article
Spreads of T 2(o), α-flocks and Ovals
We establish a representation of a spread of the generalized quadrangle T 2(0), o an oval of PG(2, q), q even, in terms of a certain family of q ovals of PG(2, q) and investigate the properties of this representa...
-
Article
Providing Anonymity in Unconditionally Secure Secret Sharing Schemes
We discuss the concept of anonymity in an unconditionally secure secret sharing scheme, proposing several types of anonymity and situations in which they might arise. We present a foundational framework and pr...
-
Chapter and Conference Paper
Permutations amongst the Dembowski-Ostrom Polynomials
We note that certain Dembowski-Ostrom polynomials can be obtained from the product of two linearised polynomials. We examine this subclass for permutation behaviour over finite fields. In particular, a new inf...
-
Article
Characterisations of Flock Quadrangles
We characterise the Hermitian and Kantor flock generalized quadrangles of order (q 2,q), q even, (associated with the linear and Fisher–Thas–Walker flocks of a quadratic cone, and the Desarguesian and Betten–Walk...
-
Article
Unitals which meet Baer subplanes in 1 moduloq points
We prove that a parabolic unitalU in a translation plane π of orderq 2 with kernel containing GF(q) is a Buekenhout-Metz unital if and only if certain Baer subplanes containing the translation line of π meetU in ...