Author of the publication

A Study from the Data Anonymization Competition Pwscup 2015.

, , , , , and . DPM/QASA@ESORICS, volume 9963 of Lecture Notes in Computer Science, page 230-237. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electronic Auctions with Private Bids., , and . USENIX Workshop on Electronic Commerce, USENIX Association, (1998)Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015., and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 901-913. Springer, (2017)Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks., , , , and . DSC, page 1-8. IEEE, (2018)(M+1)st-Price Auction Protocol.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (3): 676-683 (2002)How Much is Risk Increased by Sharing Credential in Group?, , and . STM, volume 10547 of Lecture Notes in Computer Science, page 103-117. Springer, (2017)Secure Asymmetric Watermark Detection Without Secret of Modified Pixels., and . WISA, volume 3786 of Lecture Notes in Computer Science, page 165-178. Springer, (2005)How Many Malicious Scanners Are in the Internet?, and . WISA, volume 4298 of Lecture Notes in Computer Science, page 381-390. Springer, (2006)Identification of incompletely specified multiple-valued Kleenean functions., , , and . IEEE Trans. Syst. Man Cybern. Part A, 28 (5): 637-647 (1998)Privacy-Preserving Decision Tree Learning with Boolean Target Class., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (11): 2291-2300 (2015)SWIPASS: Image-Based User Authentication for Touch Screen Devices., , , and . J. Inf. Process., 24 (2): 227-236 (2016)