Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015., and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 901-913. Springer, (2017)Electronic Auctions with Private Bids., , and . USENIX Workshop on Electronic Commerce, USENIX Association, (1998)Identification of incompletely specified multiple-valued Kleenean functions., , , and . IEEE Trans. Syst. Man Cybern. Part A, 28 (5): 637-647 (1998)SWIPASS: Image-Based User Authentication for Touch Screen Devices., , , and . J. Inf. Process., 24 (2): 227-236 (2016)(M+1)st-Price Auction Protocol.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (3): 676-683 (2002)Improvement of Estimate Distribution with Local Differential Privacy., and . MDAI, volume 13408 of Lecture Notes in Computer Science, page 68-79. Springer, (2022)Accuracy of Privacy-Preserving Collaborative Filtering Based on Quasi-homomorphic Similarity., , , , and . UIC/ATC, page 555-562. IEEE Computer Society, (2012)Distributed auction servers resolving winner and winning bid without revealing privacy of bids., , , and . ICPADS Workshops, page 307-312. IEEE Computer Society, (2000)Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree., , and . ICPP Workshops, page 204-211. IEEE Computer Society, (1999)Privacy-Preserving Dose-Response Relationship Test., , and . NBiS, page 506-510. IEEE Computer Society, (2014)