From post

ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence.

, , и . TrustBus, том 8058 из Lecture Notes in Computer Science, стр. 137-148. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scaling private proximity testing protocols for geofenced information exchange: A metropolitan-wide case study., , , и . Comput. Networks, (2024)Insiders Trapped in the Mirror Reveal Themselves in Social Media., , , и . NSS, том 7873 из Lecture Notes in Computer Science, стр. 220-235. Springer, (2013)Search Engines: Gateway to a New "Panopticon"?, , , и . TrustBus, том 5695 из Lecture Notes in Computer Science, стр. 11-21. Springer, (2009)Youtube User and Usage Profiling: Stories of Political Horror and Security Success., , , и . ICETE (Selected Papers), том 456 из Communications in Computer and Information Science, стр. 270-289. Springer, (2013)PP-TAN: a Privacy Preserving Multi-party Tree Augmented Naive Bayes Classifier., , , и . SEEDA-CECNSM, стр. 1-8. IEEE, (2020)Profiling online social networks users: an omniopticon tool., , , и . IJSNM, 2 (4): 293-313 (2017)Revisiting Legal and Regulatory Requirements for Secure E-Voting., , и . SEC, том 214 из IFIP Conference Proceedings, стр. 469-480. Kluwer, (2002)Data Breach Notification: Issues and Challenges for Security Management., и . MCIS, стр. 60. University of Nicosia / AISeL, (2016)Digital forensics in the Cloud Computing Era., , и . GLOBECOM Workshops, стр. 775-780. IEEE, (2012)Human Control and Discretion in AI-driven Decision-making in Government., , и . ICEGOV, стр. 10-16. ACM, (2021)