Author of the publication

Open census for addressing false identity attacks in agent-based decentralized social networks.

, , , , , and . AAMAS, page 1569-1570. IFAAMAS/ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Résolution de problèmes non linéaires avec continuum de solutions., , and . JFPLC, page 27-. (2002)Speeding Up Elliptic Curve Multiplication with Mixed-base Representation for Applications to SIDH Ciphers., and . CoRR, (2019)Intelligent Browsing Assistance for Corporate Knowledge Portals., , and . FLAIRS, page 182-185. AAAI Press, (2006)Using Privacy Loss to Guide Decisions During Distributed CSP Search., and . FLAIRS, page 770-775. AAAI Press, (2004)Arithmetic circuit for the first solution of distributed CSPs with cryptographic multi-party computations.. IAT, page 609-613. IEEE Computer Society, (2003)Distributed Constraint Satisfaction and Optimization with Privacy Enforcement., and . IAT, page 531-535. IEEE Computer Society, (2004)Constant Cost of the Computation-Unit in Efficiency Graphs for DCOP Solvers., , , , , and . IAT, page 380-384. IEEE Computer Society, (2008)978-0-7695-3496-1.Directed soft arc consistency in pseudo trees., , , , and . AAMAS (2), page 1065-1072. IFAAMAS, (2009)Local and Global Skeleton Fitting Techniques for Optical Motion Capture., , , , and . CAPTECH, volume 1537 of Lecture Notes in Computer Science, page 26-40. Springer, (1998)Meeting Scheduling Guaranteeing n/2-Privacy and Resistant to Statistical Analysis (Applicable to any DisCSP).. Web Intelligence, page 711-715. IEEE Computer Society, (2004)