Author of the publication

Detecting Traitors in Re-publishing Updated Datasets.

, , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 205-220. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Privacy in Knowledge Graphs With Personalized Anonymization., , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 2181-2193 (July 2024)Privacy-Preserving Sequential Publishing of Knowledge Graphs., , and . ICDE, page 2021-2026. IEEE, (2021)Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services., , , , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 437-451. Springer, (2013)Cluster-Based Anonymization of Directed Graphs., , and . CIC, page 91-100. IEEE, (2019)zkSSI: A Zero-Knowledge-Based Self-Sovereign Identity Framework., , , and . Blockchain, page 276-285. IEEE, (2024)Blockchain-based Federated Learning Utilizing Zero-Knowledge Proofs for Verifiable Training and Aggregation., , , , , and . Blockchain, page 54-63. IEEE, (2024)Privacy-preserving Decentralized Learning of Knowledge Graph Embeddings., , , and . EDBT/ICDT Workshops, volume 3379 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Detecting Traitors in Re-publishing Updated Datasets., , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 205-220. Springer, (2013)Cluster-Based Anonymization of Knowledge Graphs., , and . ACNS (2), volume 12147 of Lecture Notes in Computer Science, page 104-123. Springer, (2020)An Indexed Bottom-up Approach for Publishing Anonymized Data., , , and . CIS, page 641-645. IEEE Computer Society, (2012)