Author of the publication

Membership privacy: a unifying framework for privacy definitions.

, , , , and . ACM Conference on Computer and Communications Security, page 889-900. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Membership privacy: a unifying framework for privacy definitions., , , , and . ACM Conference on Computer and Communications Security, page 889-900. ACM, (2013)PriView: practical differentially private release of marginal contingency tables., , and . SIGMOD Conference, page 1435-1446. ACM, (2014)Differential Privacy: From Theory to Practice, , , and . Synthesis Lectures on Information Security, Privacy, & Trust Morgan & Claypool Publishers, (2016)Enhancing security behaviour by supporting the user., , , , and . Comput. Secur., (2018)A Study of Probabilistic Password Models., , , and . IEEE Symposium on Security and Privacy, page 689-704. IEEE Computer Society, (2014)Minimizing private data disclosures in the smart grid., , , , , and . CCS, page 415-427. ACM, (2012)Effectiveness of a phishing warning in field settings., , , , and . HotSoS, page 14:1-14:2. ACM, (2015)Differentially Private Grids for Geospatial Data, , and . CoRR, (2012)Understanding Hierarchical Methods for Differentially Private Histograms., , and . Proc. VLDB Endow., 6 (14): 1954-1965 (2013)Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments., , , , and . Inf. Syst. Res., 34 (1): 157-177 (March 2023)