Author of the publication

Behavior-Based Propagation of Trust in Social Networks with Restricted and Anonymous Participation.

, , and . Comput. Intell., 31 (4): 642-668 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption., , , , and . AsiaCCS, page 823-834. ACM, (2017)Know Your Members' Trust., , and . UMAP Workshops, volume 997 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)An association based approach to propagate social trust in social networks., , and . UMAP Workshops, volume 872 of CEUR Workshop Proceedings, CEUR-WS.org, (2012)IoT and Big Data: An Architecture with Data Flow and Security Issues., , , and . IISSC/CN4IoT, volume 189 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 243-252. Springer, (2017)A Universal Deduplication Architecture for Secure and Efficient Cloud Storage., , , , and . TPS-ISA, page 10-19. IEEE, (2022)OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control., , , , , , and . ISC, volume 13640 of Lecture Notes in Computer Science, page 269-289. Springer, (2022)Modelling direct messaging networks with multiple recipients for cyber deception., , , , and . EuroS&P, page 1-19. IEEE, (2022)Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns., , , , , , , , and . AINTEC, page 78-86. ACM, (2023)TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing., , , and . HICSS, page 1-10. ScholarSpace, (2022)Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps., , , , , , and . ICSE, page 1671-1682. IEEE, (2021)