Author of the publication

Schemes for Privately Computing Trust and Reputation.

, , and . IFIPTM, volume 321 of IFIP Advances in Information and Communication Technology, page 1-16. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advanced Flow Models for Computing the Reputation of Internet Domains., , and . IFIPTM, volume 505 of IFIP Advances in Information and Communication Technology, page 119-134. Springer, (2017)Identifying Knots of Trust in Virtual Communities., , and . IFIPTM, volume 358 of IFIP Advances in Information and Communication Technology, page 67-81. Springer, (2011)Sharing-habits based privacy control in social networks., , and . J. Comput. Secur., 26 (2): 177-205 (2018)Analyzing the Robustness of a Comprehensive Trust-Based Model for Online Social Networks Against Privacy Attacks., , and . COMPLEX NETWORKS (1), volume 943 of Studies in Computational Intelligence, page 641-650. Springer, (2020)Implementing GDPR in Social Networks Using Trust and Context., , and . CSCML, volume 12716 of Lecture Notes in Computer Science, page 497-503. Springer, (2021)Fake News Detection in Social Networks Using Machine Learning and Trust., , , , , and . CSCML, volume 13301 of Lecture Notes in Computer Science, page 180-188. Springer, (2022)Privacy issues with sharing reputation across virtual communities., , and . PAIS, page 3. ACM, (2011)Schemes for Privately Computing Trust and Reputation., , and . IFIPTM, volume 321 of IFIP Advances in Information and Communication Technology, page 1-16. Springer, (2010)CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities., , , and . Web Intelligence, page 34-41. IEEE Computer Society, (2009)Mining meaningful and rare roles from web application usage patterns., , and . Comput. Secur., (2019)