Author of the publication

Privacy Preservation by k-Anonymization of Weighted Social Networks.

, , , , , and . ASONAM, page 423-428. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes., , , , and . Future Internet, 11 (11): 234 (2019)On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem., and . Int. J. Inf. Sec., 12 (2): 151-154 (2013)Specifying and implementing privacy-preserving cryptographic protocols., , and . Int. J. Inf. Sec., 7 (6): 395-420 (2008)New facets of mobile botnet: architecture and evaluation., , and . Int. J. Inf. Sec., 15 (5): 455-473 (2016)Designing Secure and Privacy-Aware Information Systems., , , and . Int. J. Secur. Softw. Eng., 8 (2): 1-25 (2017)A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments., , , , and . Int. J. Inf. Sec., 6 (4): 197-211 (2007)A generic accounting scheme for next generation networks., , and . Comput. Networks, 53 (14): 2408-2426 (2009)A framework for designing cloud forensic-enabled services (CFeS)., , , and . Requir. Eng., 24 (3): 403-430 (2019)Addressing privacy requirements in system design: the PriS method., , and . Requir. Eng., 13 (3): 241-255 (2008)Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification., , and . Comput. Commun., 22 (8): 697-709 (1999)