Author of the publication

Protecting location privacy against inference attacks.

, and . ACM Conference on Computer and Communications Security, page 711-713. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees., , and . SACMAT, page 101-110. ACM, (2007)Membership Inference Countermeasure With A Partially Synthetic Data Approach., , , and . ICDIS, page 374-381. IEEE, (2022)Secure aggregation in a publish-subscribe system., , , and . WPES, page 95-104. ACM, (2008)Protecting location privacy with k-confusing paths based on dynamic pseudonyms., , and . PerCom Workshops, page 285-290. IEEE Computer Society, (2013)Privacy-Preserving Publishing of Pseudonym-Based Trajectory Location Data Set., , and . ARES, page 615-624. IEEE Computer Society, (2013)Secure Context-sensitive Authorization.. Dartmouth College, USA, (2006)Classifying pulmonary nodules using dynamic enhanced CT images based on CT number histogram., , , , , , , , , and . Medical Imaging: Computer-Aided Diagnosis, volume 6514 of SPIE Proceedings, page 65143B. SPIE, (2007)Proposal of a Beat Count Ability Measurement for Learning DJ Mixing., , , and . GCCE, page 35-39. IEEE, (2019)Proposal of a Training Method for Beat Count Ability., , , and . HCI (25), volume 12205 of Lecture Notes in Computer Science, page 121-131. Springer, (2020)Confidentiality-preserving proof theories for distributed proof systems., , , and . AsiaCCS, page 145-154. ACM, (2011)