Author of the publication

SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification.

, , , , and . GLOBECOM, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Security Policies for Governmental Organisations, The Minimum Criteria., and . ISSA, page 455-466. ISSA, Pretoria, South Africa, (2009)Common problems faced during the establishment of a CSIRT., and . ISSA, ISSA, Pretoria, South Africa, (2010)Defending Adversarial Attacks via Semantic Feature Manipulation., , , , , and . CoRR, (2020)ACSIMA: A Cyber Security Index for Mobile Health Apps., , , and . ASE Workshops, page 145-152. IEEE, (2021)PART-GAN: Privacy-Preserving Time-Series Sharing., , , , and . ICANN (1), volume 12396 of Lecture Notes in Computer Science, page 578-593. Springer, (2020)OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning., , , , , and . IJCNN, page 1-8. IEEE, (2020)Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone?, , , , , and . CoRR, (2024)Demystifying the Evolution of Android Malware Variants., , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 3324-3341 (July 2024)"Who Wants to Know all this Stuff?!": Understanding Older Adults' Privacy Concerns in Aged Care Monitoring Devices., , , , , and . Interact. Comput., 33 (5): 481-498 (2021)Towards a platform to visualize the state of South Africa's information security., , and . ISSA, page 1-8. IEEE, (2014)