From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Interdependent Privacy: Let Me Share Your Data., и . Financial Cryptography, том 7859 из Lecture Notes in Computer Science, стр. 338-353. Springer, (2013)Use of Ratings from Personalized Communities for Trustworthy Application Installation., , и . NordSec, том 7127 из Lecture Notes in Computer Science, стр. 71-88. Springer, (2010)Colonel Blotto in the Phishing War., и . GameSec, том 7037 из Lecture Notes in Computer Science, стр. 201-218. Springer, (2011)KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale., , , , , , , и . IEEE Symposium on Security and Privacy, стр. 350-364. IEEE, (2019)Exploring the Use of Explicit Trust Links for Filtering Recommenders: A Study on Epinions.com., и . J. Inf. Process., (2011)Re-evaluating the Wisdom of Crowds in Assessing Web Security., и . Financial Cryptography, том 7035 из Lecture Notes in Computer Science, стр. 299-314. Springer, (2011)Analyzing the incentives in Community-based Security Systems.. PerCom Workshops, стр. 270-275. IEEE Computer Society, (2011)Community-based web security: complementary roles of the serious and casual contributors., и . CSCW, стр. 1023-1032. ACM, (2012)Certification Intermediaries and the Alternative (Poster).. Financial Cryptography, том 6052 из Lecture Notes in Computer Science, стр. 425. Springer, (2010)Is this app safe?: a large scale study on application permissions and risk signals., , и . WWW, стр. 311-320. ACM, (2012)