Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart Deferral of Messages for Privacy Protection in Online Social Networks., , , and . CoRR, (2014)Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis., , , , and . Inf. Sci., (2019)A collaborative protocol for anonymous reporting in vehicular ad hoc networks., , , , , , and . Comput. Stand. Interfaces, 36 (1): 188-197 (2013)Reconciling privacy and efficient utility management in smart cities., , , , and . Trans. Emerg. Telecommun. Technol., 25 (1): 94-108 (2014)Privacy-Preserving Enhanced Collaborative Tagging., , , , and . IEEE Trans. Knowl. Data Eng., 26 (1): 180-193 (2014)Online advertising: Analysis of privacy threats and protection approaches., , , and . Comput. Commun., (2017)Coherent, automatic address resolution for vehicular ad hoc networks., , , , , , and . Int. J. Ad Hoc Ubiquitous Comput., 25 (3): 163-179 (2017)Measuring the privacy of user profiles in personalized information systems., , and . Future Gener. Comput. Syst., (2014)A modification of the k-means method for quasi-unsupervised learning., , , and . Knowl. Based Syst., (2013)PREON: An efficient cascade revocation mechanism for delegation paths., , , and . Comput. Secur., 29 (6): 697-711 (2010)