Author of the publication

KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale.

, , , , , , , and . IEEE Symposium on Security and Privacy, page 350-364. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interdependent Privacy: Let Me Share Your Data., and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 338-353. Springer, (2013)Use of Ratings from Personalized Communities for Trustworthy Application Installation., , and . NordSec, volume 7127 of Lecture Notes in Computer Science, page 71-88. Springer, (2010)Colonel Blotto in the Phishing War., and . GameSec, volume 7037 of Lecture Notes in Computer Science, page 201-218. Springer, (2011)KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale., , , , , , , and . IEEE Symposium on Security and Privacy, page 350-364. IEEE, (2019)Re-evaluating the Wisdom of Crowds in Assessing Web Security., and . Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, page 299-314. Springer, (2011)Exploring the Use of Explicit Trust Links for Filtering Recommenders: A Study on Epinions.com., and . J. Inf. Process., (2011)Analyzing the incentives in Community-based Security Systems.. PerCom Workshops, page 270-275. IEEE Computer Society, (2011)Community-based web security: complementary roles of the serious and casual contributors., and . CSCW, page 1023-1032. ACM, (2012)Certification Intermediaries and the Alternative (Poster).. Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 425. Springer, (2010)Is this app safe?: a large scale study on application permissions and risk signals., , and . WWW, page 311-320. ACM, (2012)