Author of the publication

(t, k)-Hypergraph anonymization: an approach for secure data publishing.

, , and . Secur. Commun. Networks, 8 (7): 1306-1317 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios., , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 374-378. Springer, (2011)Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)., , and . ISeCure, 10 (2): 129-139 (2018)Editorial.. ISeCure, 4 (2): 95-96 (2012)ACoPE: An adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks., and . Comput. Networks, (2020)RAD: A Statistical Mechanism Based on Behavioral Analysis for DDoS Attack Countermeasure., and . IEEE Trans. Inf. Forensics Secur., (2022)AWA: Adversarial Website Adaptation., , and . IEEE Trans. Inf. Forensics Secur., (2021)HODA: Hardness-Oriented Detection of Model Extraction Attacks., , , and . IEEE Trans. Inf. Forensics Secur., (2024)Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 114-130 (2023)TIRIAC: A trust-driven risk-aware access control framework for Grid environments., and . Future Gener. Comput. Syst., (2016)A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments., , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 47-59. Springer, (2008)