From post

Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes.

, , , , и . DBSec, том 9766 из Lecture Notes in Computer Science, стр. 61-76. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scalable Nonlinear AUC Maximization Methods., , и . ECML/PKDD (2), том 11052 из Lecture Notes in Computer Science, стр. 292-307. Springer, (2018)On the Identification of Property Based Generalizations in Microdata Anonymization., , , и . DBSec, том 6166 из Lecture Notes in Computer Science, стр. 81-96. Springer, (2010)Workflow Resilience for Mission Critical Systems., , и . SSS, том 14310 из Lecture Notes in Computer Science, стр. 498-512. Springer, (2023)Using Parameterized UML to Specify and Compose Access Control Models., , , и . IICIS, том 140 из IFIP, стр. 49-65. Springer, (2003)Towards Trustworthy Delegation in Role-Based Access Control Model., , и . ISC, том 5735 из Lecture Notes in Computer Science, стр. 379-394. Springer, (2009)SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups., , , , , , , , , и 2 other автор(ы). SACMAT, стр. 145-155. ACM, (2023)A Responsive Defense Mechanism Against DDoS Attacks., , и . FPS, том 8930 из Lecture Notes in Computer Science, стр. 347-355. Springer, (2014)Towards Performance of NLP Transformers on URL-Based Phishing Detection for Mobile Devices., , и . J. Ubiquitous Syst. Pervasive Networks, 17 (1): 35-42 (2022)Periodic Scheduling in On-Demand Broadcast System., , и . ISTA, том P-48 из LNI, стр. 107-121. GI, (2004)Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks., и . ABAC@CODASPY, стр. 25-34. ACM, (2016)