From post

Not Only Databases: Social Data and Cybersecurity Perspective.

, , , и . A Comprehensive Guide Through the Italian Database Research, том 31 из Studies in Big Data, Springer International Publishing, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Generating K-Anonymous Logs of People Tracing Systems in Surveilled Environments., , , и . SEBD, стр. 37-44. (2014)A Light Number-Generation Scheme for Feasible and Secure Credit-Card-Payment Solutions., и . EC-Web, том 5183 из Lecture Notes in Computer Science, стр. 11-20. Springer, (2008)Reducing Data Stream Sliding Windows by Cyclic Tree-Like Histograms., и . PKDD, том 3202 из Lecture Notes in Computer Science, стр. 75-86. Springer, (2004)Binary-Tree Histograms with Tree Indices., , , и . DEXA, том 2453 из Lecture Notes in Computer Science, стр. 861-870. Springer, (2002)A Model to Support Multi-Social-Network Applications., , , и . OTM Conferences, том 8841 из Lecture Notes in Computer Science, стр. 639-656. Springer, (2014)A privacy-preserving e-participation framework allowing citizen opinion analysis., , и . Electron. Gov. an Int. J., 11 (3): 185-206 (2015)Allowing privacy-preserving fog computing with digital identity assurance in remote clinical services., , и . Electron. Gov. an Int. J., 19 (2): 185-201 (2023)Exploiting European GNSS and Ethereum in location proof systems., и . Int. J. Digit. Earth, 15 (1): 1018-1037 (2022)A system to enforce user's preference in OSN advertising., и . ASONAM, стр. 1174-1178. ACM, (2019)Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks., , , , , , и . SAFECOMP, том 8666 из Lecture Notes in Computer Science, стр. 214-229. Springer, (2014)