Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions., , , and . Comput. Commun., (April 2023)A2RID - Anonymous Direct Authentication and Remote Identification of Commercial Drones., , , and . IEEE Internet Things J., 10 (12): 10587-10604 (June 2023)PPRQ: Privacy-Preserving MAX/MIN Range Queries in IoT Networks., and . IEEE Internet Things J., 8 (6): 5075-5092 (2021)Predicting Influential Users in Online Social Network Groups., , , , and . ACM Trans. Knowl. Discov. Data, 15 (3): 35:1-35:50 (2021)CloRoFor: Cloud Robust Forensics., , and . CoRR, (2015)Social Fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling., , , , and . CoRR, (2017)Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary., , , , and . IACR Cryptology ePrint Archive, (2008)The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack, , , , and . CoRR, (2009)Efficient and secure keys management for wireless mobile communications., , and . POMC, page 66-73. ACM, (2002)A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets., and . MDAI, volume 5285 of Lecture Notes in Computer Science, page 203-214. Springer, (2008)