Author of the publication

Privacy Preserving Location-Aware Personalized Web Service Recommendations.

, , , , , , and . IEEE Trans. Serv. Comput., 14 (3): 791-804 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A multistage protocol for aggregated queries in distributed cloud databases with privacy protection., , , , , and . Future Gener. Comput. Syst., (2019)Crowdfunding the Insurance of a Cyber-Product Using Blockchain., , and . UEMCON, page 964-970. IEEE, (2018)Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking., , , and . IEEE Access, (2018)Blockchain-Enabled Intelligent Vehicular Edge Computing., , , , , and . IEEE Netw., 35 (3): 125-131 (2021)Privacy, Security, and Utility Analysis of Differentially Private CPES Data., , and . CNS, page 65-73. IEEE, (2021)A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues., , , , , , , , and . Sensors, 20 (9): 2464 (2020)Pooling Approach for Task Allocation in the Blockchain Based Decentralized Storage Network., , , , and . CNSM, page 1-6. IEEE, (2019)Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense., , and . CCWC, page 708-714. IEEE, (2019)Privacy Preserving Location Recommendations., , , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 502-516. Springer, (2017)Game theoretic approach applied in cybersecurity information exchange framework., , and . CCNC, page 1-7. IEEE, (2020)