Author of the publication

Interdependent Privacy: Let Me Share Your Data.

, and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 338-353. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interdependent Privacy: Let Me Share Your Data., and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 338-353. Springer, (2013)Use of Ratings from Personalized Communities for Trustworthy Application Installation., , and . NordSec, volume 7127 of Lecture Notes in Computer Science, page 71-88. Springer, (2010)KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale., , , , , , , and . IEEE Symposium on Security and Privacy, page 350-364. IEEE, (2019)Colonel Blotto in the Phishing War., and . GameSec, volume 7037 of Lecture Notes in Computer Science, page 201-218. Springer, (2011)Certification Intermediaries and the Alternative (Poster).. Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 425. Springer, (2010)Community-based web security: complementary roles of the serious and casual contributors., and . CSCW, page 1023-1032. ACM, (2012)Re-evaluating the Wisdom of Crowds in Assessing Web Security., and . Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, page 299-314. Springer, (2011)Analyzing the incentives in Community-based Security Systems.. PerCom Workshops, page 270-275. IEEE Computer Society, (2011)Exploring the Use of Explicit Trust Links for Filtering Recommenders: A Study on Epinions.com., and . Inf. Media Technol., 6 (3): 871-883 (2011)Does Trust Matter for User Preferences? A Study on Epinions Ratings., and . IFIPTM, volume 321 of IFIP Advances in Information and Communication Technology, page 232-247. Springer, (2010)