Author of the publication

Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015.

, and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 901-913. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Decision Tree Learning with Boolean Target Class., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (11): 2291-2300 (2015)Multiparty Computation from El Gamal/Paillier Conversion., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (1): 137-146 (2009)Designing a Location Trace Anonymization Contest., , , , , , , , , and 6 other author(s). Proc. Priv. Enhancing Technol., 2023 (1): 225-243 (January 2023)Attacker models with a variety of background knowledge to de-identified data., , and . J. Ambient Intell. Humaniz. Comput., 14 (11): 15037-15047 (2023)Proposal of anonymization dictionary using disclosed statements by business operators., , , , , , and . Internet Things, (2022)SWIPASS: Image-Based User Authentication for Touch Screen Devices., , , and . J. Inf. Process., 24 (2): 227-236 (2016)Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection., and . J. Inf. Process., 22 (2): 388-400 (2014)(M+1)st-Price Auction Protocol.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (3): 676-683 (2002)Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks., , , , and . Int. J. Inf. Sec., 19 (3): 245-255 (2020)Identification of incompletely specified multiple-valued Kleenean functions., , , and . IEEE Trans. Syst. Man Cybern. Part A, 28 (5): 637-647 (1998)