Author of the publication

pQUANT: A User-Centered Privacy Risk Analysis Framework.

, , , and . CRiSIS, volume 12026 of Lecture Notes in Computer Science, page 3-16. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On a new edge function on complete weighted graphs and its application for locating Hamiltonian cycles of small weight., , , and . Optim. Lett., 10 (6): 1203-1220 (2016)A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs., and . FGIT-SecTech, volume 259 of Communications in Computer and Information Science, page 155-166. Springer, (2011)A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution., , , and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 72-79. Springer, (2011)Monotonicity and inert fugitive search games., and . Electron. Notes Discret. Math., (1999)On the Use of Weber Polynomials in Elliptic Curve Cryptography., , and . EuroPKI, volume 3093 of Lecture Notes in Computer Science, page 335-349. Springer, (2004)Trust in global computing systems as a limit property emerging from short range random interactions., , , and . ARES, page 741-748. IEEE Computer Society, (2007)Approximating the unsatisfiability threshold of random formulas., , , and . Random Struct. Algorithms, 12 (3): 253-269 (1998)On the Existence of Consensus Converging Organized Groups in Large Social Networks., , , and . SIROCCO, volume 14662 of Lecture Notes in Computer Science, page 507-512. Springer, (2024)A Worm Propagation Model Based on People's Email Acquaintance Profiles., , and . WINE, volume 4286 of Lecture Notes in Computer Science, page 343-352. Springer, (2006)A Trust-Centered Approach for Building E-Voting Systems., , , , , , and . EGOV, volume 4656 of Lecture Notes in Computer Science, page 366-377. Springer, (2007)