Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Quantitative Analysis of Common Criteria Certification Practice., , and . TrustBus, volume 8647 of Lecture Notes in Computer Science, page 132-143. Springer, (2014)An entropy based method for measuring anonymity.. SecureComm, page 28-32. IEEE, (2007)Sharing Data for Public Security., , , and . PrimeLife, volume 320 of IFIP Advances in Information and Communication Technology, page 188-197. Springer, (2009)Risk-Aware Information Disclosure., , , and . DPM/SETOP/QASA, volume 8872 of Lecture Notes in Computer Science, page 266-276. Springer, (2014)Modeling Synaptic Transmission and Quantifying Information Transfer in the Granular Layer of the Cerebellum., , , , and . IWANN, volume 3512 of Lecture Notes in Computer Science, page 107-114. Springer, (2005)Data disclosure risk evaluation., , , and . CRiSIS, page 35-72. IEEE, (2009)From Research Results to Strategy: A Mapping Exercise., , and . ISSE, page 256-264. Springer, (2014)Model-Based Big Data Analytics-as-a-Service: Take Big Data to the Next Level., , , , , and . IEEE Trans. Serv. Comput., 14 (2): 516-529 (2021)Differential Privacy Based Access Control., and . OTM Conferences, volume 10033 of Lecture Notes in Computer Science, page 962-974. (2016)Expressing privacy metrics as one-symbol information.. EDBT/ICDT Workshops, ACM, (2010)