From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Insiders Trapped in the Mirror Reveal Themselves in Social Media., , , и . NSS, том 7873 из Lecture Notes in Computer Science, стр. 220-235. Springer, (2013)Scaling private proximity testing protocols for geofenced information exchange: A metropolitan-wide case study., , , и . Comput. Networks, (2024)Search Engines: Gateway to a New "Panopticon"?, , , и . TrustBus, том 5695 из Lecture Notes in Computer Science, стр. 11-21. Springer, (2009)PPDM-TAN: A Privacy-Preserving Multi-Party Classifier., , , и . Comput., 9 (1): 6 (2021)Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment., , , , и . Inf. Comput. Secur., 24 (1): 2-19 (2016)Youtube User and Usage Profiling: Stories of Political Horror and Security Success., , , и . ICETE (Selected Papers), том 456 из Communications in Computer and Information Science, стр. 270-289. Springer, (2013)PP-TAN: a Privacy Preserving Multi-party Tree Augmented Naive Bayes Classifier., , , и . SEEDA-CECNSM, стр. 1-8. IEEE, (2020)Profiling online social networks users: an omniopticon tool., , , и . IJSNM, 2 (4): 293-313 (2017)Data Breach Notification: Issues and Challenges for Security Management., и . MCIS, стр. 60. University of Nicosia / AISeL, (2016)Employees' privacy vs. employers' security: Can they be balanced?, и . Telematics Informatics, 23 (3): 164-178 (2006)