Author of the publication

Inference-proof Data Filtering for a Probabilistic Setting.

, , , and . PrivOn@ISWC, volume 1951 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steganography Using Modern Arts., and . IFIP TCS, volume 1872 of Lecture Notes in Computer Science, page 140-151. Springer, (2000)Auctions for Partial Heterogeneous Preferences., , , and . MFCS, volume 8087 of Lecture Notes in Computer Science, page 183-194. Springer, (2013)Improving Interoperability in Multi-domain Enterprise Right Management Applications., and . ICISSP (Revised Selected Papers), volume 1221 of Communications in Computer and Information Science, page 382-402. Springer, (2019)A Novel Approach to Proactive Password Checking., , , and . InfraSec, volume 2437 of Lecture Notes in Computer Science, page 30-39. Springer, (2002)Biometric/Cryptographic Keys Binding Based on Function Minimization., , and . SITIS, page 144-150. IEEE Computer Society, (2016)Private Computation with Shared Randomness over Broadcast Channel., and . ICISC, volume 2288 of Lecture Notes in Computer Science, page 244-257. Springer, (2001)Minority Becomes Majority in Social Networks., , , , and . WINE, volume 9470 of Lecture Notes in Computer Science, page 74-88. Springer, (2015)Towards a Mechanism for Incentivating Privacy., , , and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 472-488. Springer, (2011)On Tracking Ransomware on the File System., and . ICISSP, page 210-219. SCITEPRESS, (2022)Inference-proof Data Filtering for a Probabilistic Setting., , , and . PrivOn@ISWC, volume 1951 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)