From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Quantitative Analysis of Common Criteria Certification Practice., , и . TrustBus, том 8647 из Lecture Notes in Computer Science, стр. 132-143. Springer, (2014)An entropy based method for measuring anonymity.. SecureComm, стр. 28-32. IEEE, (2007)Sharing Data for Public Security., , , и . PrimeLife, том 320 из IFIP Advances in Information and Communication Technology, стр. 188-197. Springer, (2009)Risk-Aware Information Disclosure., , , и . DPM/SETOP/QASA, том 8872 из Lecture Notes in Computer Science, стр. 266-276. Springer, (2014)Modeling Synaptic Transmission and Quantifying Information Transfer in the Granular Layer of the Cerebellum., , , , и . IWANN, том 3512 из Lecture Notes in Computer Science, стр. 107-114. Springer, (2005)Data disclosure risk evaluation., , , и . CRiSIS, стр. 35-72. IEEE, (2009)From Research Results to Strategy: A Mapping Exercise., , и . ISSE, стр. 256-264. Springer, (2014)Model-Based Big Data Analytics-as-a-Service: Take Big Data to the Next Level., , , , , и . IEEE Trans. Serv. Comput., 14 (2): 516-529 (2021)Differential Privacy Based Access Control., и . OTM Conferences, том 10033 из Lecture Notes in Computer Science, стр. 962-974. (2016)Expressing privacy metrics as one-symbol information.. EDBT/ICDT Workshops, ACM, (2010)