Author of the publication

A Study from the Data Anonymization Competition Pwscup 2015.

, , , , , and . DPM/QASA@ESORICS, volume 9963 of Lecture Notes in Computer Science, page 230-237. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information State Based Multimodal Dialogue Management: Estimating Conversational Engagement from Gaze Information., and . IVA, volume 5773 of Lecture Notes in Computer Science, page 531-532. Springer, (2009)Study on Record Linkage of Anonymizied Data., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (1): 19-28 (2018)Synchro: Block-generation Protocol to Synchronously Process Cross-shard Transactions in State Sharding., , and . CoRR, (2023)How to Handle Excessively Anonymized Datasets., , , , , , , and . J. Inf. Process., (2018)Designing a Location Trace Anonymization Contest., , , , , , , , , and 6 other author(s). CoRR, (2021)Custom-made Anonymization by Data Analysis Program Provided by Recipient., and . CODASPY, page 149-151. ACM, (2019)Evaluation of Secure Remote Offering Service for Information Bank., , and . CODASPY, page 144-146. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..A Study from the Data Anonymization Competition Pwscup 2015., , , , , and . DPM/QASA@ESORICS, volume 9963 of Lecture Notes in Computer Science, page 230-237. Springer, (2016)Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets., , , and . ACSAC, page 146-155. IEEE Computer Society, (2004)Threat Tree Templates to Ease Difficulties in Threat Modeling., and . NBiS, page 673-678. IEEE Computer Society, (2011)