Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulatable certificateless two-party authenticated key agreement protocol., , , and . Inf. Sci., 180 (6): 1020-1030 (2010)Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications., , and . IEEE Trans. Vehicular Technology, 59 (2): 559-573 (2010)Statistical Disclosure Control, , , , , , and . Wiley, Chichester, (2012)New Directions in Anonymization: Permutation Paradigm, Verifiability by Subjects and Intruders, Transparency to Users., and . CoRR, (2015)Marginality: a numerical mapping for enhanced treatment of nominal and hierarchical attributes. CoRR, (2012)Give more data, awareness and control to individual citizens, and they will help COVID-19 containment., , , , , , , , , and 24 other author(s). CoRR, (2020)On the connections between statistical disclosure control for microdata and some artificial intelligence tools., and . Inf. Sci., (2003)Secure Many-to-One Transmission of q-ary Symbols., , and . INTELLCOMM, volume 3283 of Lecture Notes in Computer Science, page 85-91. Springer, (2004)Safety and Privacy in Vehicular Communications., and . Privacy in Location-Based Applications, volume 5599 of Lecture Notes in Computer Science, page 173-189. Springer, (2009)Privacy-Preserving and Co-utile Distributed Social Credit.. IWOCA, volume 10765 of Lecture Notes in Computer Science, page 371-382. Springer, (2017)