Author of the publication

Resolving privacy-preserving relationships over outsourced encrypted data storages.

, , , , and . Int. J. Inf. Sec., 15 (2): 195-209 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resolving privacy-preserving relationships over outsourced encrypted data storages., , , , and . Int. J. Inf. Sec., 15 (2): 195-209 (2016)Meta-Tacs: A Trust Model Demonstration Of Robustness Through A Genetic Algorithm., , and . Intell. Autom. Soft Comput., 17 (1): 41-59 (2011)A Bio-Inspired Reaction Against Cyberattacks: AIS-Powered Optimal Countermeasures Selection., , and . IEEE Access, (2021)Screening Out Social Bots Interference: Are There Any Silver Bullets?, , , , , , and . IEEE Communications Magazine, 57 (8): 98-104 (2019)Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems., and . Comput. Stand. Interfaces, 32 (4): 185-196 (2010)Dendron : Genetic trees driven rule induction for network intrusion detection systems., , and . Future Gener. Comput. Syst., (2018)Dynamic counter-measures for risk-based access control systems: An evolutive approach., , , and . Future Gener. Comput. Syst., (2016)Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach., , and . IEEE Internet Comput., 18 (2): 32-40 (2014)Editorial: special issue on advances in security and privacy for future mobile communications., , and . Electron. Commer. Res., 15 (1): 73-74 (2015)Triggering IDM Authentication Methods based on Device Capabilities Information., , and . Sicherheit, volume P-195 of LNI, page 235-244. GI, (2012)