Author of the publication

Modeling the Risk of Data Breach Incidents at the Firm Level.

, and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 135-148. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SWIPASS: Image-Based User Authentication for Touch Screen Devices., , , and . J. Inf. Process., 24 (2): 227-236 (2016)Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection., and . J. Inf. Process., 22 (2): 388-400 (2014)Proposal of anonymization dictionary using disclosed statements by business operators., , , , , , and . Internet Things, (2022)Attacker models with a variety of background knowledge to de-identified data., , and . J. Ambient Intell. Humaniz. Comput., 14 (11): 15037-15047 (2023)Designing a Location Trace Anonymization Contest., , , , , , , , , and 6 other author(s). Proc. Priv. Enhancing Technol., 2023 (1): 225-243 (January 2023)(M+1)st-Price Auction Protocol.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (3): 676-683 (2002)Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015., and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 901-913. Springer, (2017)Electronic Auctions with Private Bids., , and . USENIX Workshop on Electronic Commerce, USENIX Association, (1998)Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks., , , , and . DSC, page 1-8. IEEE, (2018)How Much is Risk Increased by Sharing Credential in Group?, , and . STM, volume 10547 of Lecture Notes in Computer Science, page 103-117. Springer, (2017)