Author of the publication

PKIX Certificate Status in Hybrid MANETs.

, , , and . WISTP, volume 5746 of Lecture Notes in Computer Science, page 153-166. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Fast Maximum Distance to Average Vector (F-MDAV): An algorithm for k-anonymous microaggregation in big data., , , , , and . Eng. Appl. Artif. Intell., (2020)Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems., , and . Entropy, 16 (3): 1586-1631 (2014)Composition in Differential Privacy for General Granularity Notions (Long Version)., , , and . CoRR, (2023)A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings., , and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 42-57. Springer, (2011)Privacy-Protecting Techniques for Behavioral Data: A Survey., , , and . CoRR, (2021)On the privacy-utility trade-off in differentially private hierarchical text classification., , , , and . CoRR, (2021)Node Injection Link Stealing Attack., , , and . CoRR, (2023)Entropy-Based Privacy against Profiling of User Mobility., , , , , , and . Entropy, 17 (6): 3913-3946 (2015)Optimized, direct sale of privacy in personal data marketplaces.. Inf. Sci., (2018)SoK: Differentially Private Publication of Trajectory Data., , , , and . Proc. Priv. Enhancing Technol., 2023 (2): 496-516 (April 2023)