Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weighted network decapitation: the economics of iterated attack and defense.. CIKM-PAVLAD, page 33-36. ACM, (2009)Co-citations and Relevance of Authors and Author Groups., , and . International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 19 (Supplement-1): 127-139 (2011)Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation., and . Data Min. Knowl. Discov., 11 (2): 195-212 (2005)Secure Many-to-One Communications in Wireless Sensor Networks., , , and . Sensors, 9 (7): 5324-5338 (2009)Inference Control in Statistical Databases.. Encyclopedia of Database Systems (2nd ed.), Springer, (2018)Microdata.. Encyclopedia of Database Systems (2nd ed.), Springer, (2018)k-Anonymity.. Encyclopedia of Database Systems (2nd ed.), Springer, (2018)Data Rank/Swapping.. Encyclopedia of Database Systems (2nd ed.), Springer, (2018)Validating Distance-Based Record Linkage with Probabilistic Record Linkage., and . CCIA, volume 2504 of Lecture Notes in Computer Science, page 207-215. Springer, (2002)LHS-Based Hybrid Microdata vs Rank Swapping and Microaggregation for Numeric Microdata Protection., , and . Inference Control in Statistical Databases, volume 2316 of Lecture Notes in Computer Science, page 153-162. Springer, (2002)