Author of the publication

Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions.

, , , and . Comput. Commun., (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mapping the File Systems Genome: rationales, technique, results and applications., , , and . CoRR, (2013)RFID security and privacy: long-term research or short-term tinkering?, , , , , , and . WISEC, page 160. ACM, (2008)Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments)., , , and . WiSec, page 12-22. ACM, (2019)Detecting Drones Status via Encrypted Traffic Analysis., , , and . WiseML@WiSec, page 67-72. ACM, (2019)GPU Algorithms for K-Anonymity in Microdata., , , and . CNS, page 1-9. IEEE, (2019)LLD: A Low Latency Detection Solution to Thwart Cryptocurrency Pump & Dumps., , and . ICBC, page 1-9. IEEE, (2023)VISIO: A Visual Approach for Singularity Detection in Recommendation Systems., , , and . TrustBus, volume 9264 of Lecture Notes in Computer Science, page 33-47. Springer, (2015)New Dimensions of Information Warfare: The Economic Pillar - Fintech and Cryptocurrencies., , , and . CRiSIS, volume 12528 of Lecture Notes in Computer Science, page 3-27. Springer, (2020)Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations., , and . CNS, page 109-117. IEEE, (2022)Vessels Cybersecurity: Issues, Challenges, and the Road Ahead., , , , and . CoRR, (2020)