Author of the publication

Privacy Preserving Location Recommendations.

, , , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 502-516. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk of Asynchronous Protocol Update: Attacks to Monero Protocols., , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 307-321. Springer, (2019)A Web Service Architecture for Bidirectional XML Updating., , , , , and . APWeb/WAIM, volume 4505 of Lecture Notes in Computer Science, page 721-732. Springer, (2007)TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique., , , , and . CoRR, (2019)Concise Mercurial Subvector Commitments: Definitions and Constructions., , , , , and . ACISP, volume 13083 of Lecture Notes in Computer Science, page 353-371. Springer, (2021)Poster: Multi-Writer Searchable Encryption with Fast Search and Post-Quantum Security., and . ICDCS, page 1-2. IEEE, (2023)A New Evaluation Method for Medical Image Information Hiding Techniques., , , and . EMBC, page 6119-6122. IEEE, (2020)Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol., , , , and . CANS, volume 11829 of Lecture Notes in Computer Science, page 235-246. Springer, (2019)MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol., , , , and . CCS, page 567-584. ACM, (2019)Towards privacy-preserving classification in neural networks., , and . PST, page 392-399. IEEE, (2016)An Intelligent Intruder Model for Security Protocol Analysis., , and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 13-22. Springer, (2001)