Author of the publication

Social-K: Real-time K-anonymity guarantees for social network applications.

, , and . PerCom Workshops, page 600-606. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Touch Me Wear: Getting Physical with Social Networks., , and . CSE (4), page 960-965. IEEE Computer Society, (2009)Email Engagement Segmentation Using Bipartite Graph Co-clustering., and . ICDM Workshops, page 540-546. IEEE Computer Society, (2015)Social-K: Real-time K-anonymity guarantees for social network applications., , and . PerCom Workshops, page 600-606. IEEE Computer Society, (2010)q-Anon: Rethinking Anonymity for Social Networks., , and . SocialCom/PASSAT, page 185-192. IEEE Computer Society, (2010)Towards scalable and robust distributed intrusion alert fusion with good load balancing., , and . LSAD@SIGCOMM, page 115-122. ACM, (2006)WhozThat? evolving an ecosystem for context-aware mobile social networks., , , , , , , , , and 2 other author(s). IEEE Netw., 22 (4): 50-55 (2008)q-Anon: practical anonymity for social networks., , and . Int. J. Soc. Comput. Cyber Phys. Syst., 1 (3): 223-241 (2012)Fusing mobile, sensor, and social data to fully enable context-aware computing., , , , , , and . HotMobile, page 60-65. ACM, (2010)Enhancing group recommendation by incorporating social relationship interactions., , , , , , and . GROUP, page 97-106. ACM, (2010)Solutions to Security and Privacy Issues in Mobile Social Networking., , and . CSE (4), page 1036-1042. IEEE Computer Society, (2009)