Author of the publication

A Literature Survey and Classifications on Data Deanonymisation.

, , , , and . CRiSIS, volume 9572 of Lecture Notes in Computer Science, page 36-51. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collateral Damage in Online Social Networks: computing the significance of information collection., and . IACR Cryptology ePrint Archive, (2016)Keyless car sharing system: A security and privacy analysis., , and . ISC2, page 1-7. IEEE, (2016)HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System., , , , and . CoRR, (2021)SC2Share: Smart Contract for Secure Car Sharing., , , , and . ICISSP, page 163-171. SciTePress, (2019)Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence., , , , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 194-208. Springer, (2016)Collateral Damage of Facebook Applications: a Comprehensive Study., , , , , and . IACR Cryptology ePrint Archive, (2018)Collateral damage of Facebook third-party applications: a comprehensive study., , , , , and . Comput. Secur., (2018)HERMES: Scalable, Secure, and Privacy-Enhancing Vehicular Sharing-Access System., , , , , and . IEEE Internet Things J., 9 (1): 129-151 (2022)HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System., , , , and . IACR Cryptol. ePrint Arch., (2020)Collateral Damage of Online Social Network Applications., , and . ICISSP, page 536-541. SciTePress, (2016)