Author of the publication

A Private and Reliable Recommendation System for Social Networks.

, , and . SocialCom/PASSAT, page 816-825. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biometric-Based Non-transferable Anonymous Credentials., and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 165-180. Springer, (2009)Secure Outsourcing of DNA Searching via Finite Automata., and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 49-64. Springer, (2010)PICCO: a general-purpose compiler for private distributed computation., , and . ACM Conference on Computer and Communications Security, page 813-826. ACM, (2013)Deniable cloud storage: sharing files via public-key deniability., , and . WPES, page 31-42. ACM, (2010)On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting., and . SECRYPT, page 68-77. SciTePress, (2011)Dynamic and efficient key management for access hierarchies., , and . CCS, page 190-202. ACM, (2005)Privacy Preserving Biometric Authentication for Fingerprints and Beyond., and . CODASPY, page 367-378. ACM, (2024)Achieving Full Security in Privacy-Preserving Data Mining.. SocialCom/PASSAT, page 925-934. IEEE Computer Society, (2011)Improving the Security and Efficiency of Private Genomic Computation Using Server Aid., and . IEEE Secur. Priv., 15 (5): 20-28 (2017)Internet Addiction: Metasynthesis of 1996-2006 Quantitative Research., , , , , , , , , and 1 other author(s). Cyberpsy., Behavior, and Soc. Networking, 12 (2): 203-207 (2009)