Secure Random Sampling in Differential Privacy | 1 | 0.35 | 2021 |
Secure k-Anonymization over Encrypted Databases | 0 | 0.34 | 2021 |
Computing multi-modal journey plans under uncertainty | 0 | 0.34 | 2019 |
The Bounded Laplace Mechanism in Differential Privacy. | 0 | 0.34 | 2018 |
(k, ε)-Anonymity: k-Anonymity with ε-Differential Privacy. | 0 | 0.34 | 2017 |
Fpvi: A Scalable Method For Discovering Privacy Vulnerabilities In Microdata | 0 | 0.34 | 2016 |
IPV: A system for identifying privacy vulnerabilities in datasets. | 0 | 0.34 | 2016 |
A Multi-Scale Approach to Data-Driven Mass Migration Analysis. | 0 | 0.34 | 2016 |
Mobility Mining for Journey Planning in Rome | 0 | 0.34 | 2015 |
Efficient algorithms for identifying privacy vulnerabilities | 2 | 0.48 | 2015 |
Contingent Versus Deterministic Plans In Multi-Modal Journey Planning | 3 | 0.39 | 2015 |
Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption. | 0 | 0.34 | 2014 |
Multidimensional Reputation Network for Service Composition in the Internet of Things | 1 | 0.35 | 2014 |
Mosco: a privacy-aware middleware for mobile social computing. | 3 | 0.38 | 2014 |
Answering queries using pairings. | 0 | 0.34 | 2014 |
A Framework for Trust-Based Multidisciplinary Team Recommendation. | 1 | 0.38 | 2013 |
The zen of multidisciplinary team recommendation | 1 | 0.37 | 2013 |
Distributed access control policies for spectrum sharing. | 1 | 0.35 | 2013 |
A Method and Guidelines for the Cooperation of Ontologies and Relational Databases in Semantic Web Applications. | 1 | 0.36 | 2012 |
PriSM: A Private Social Mesh for Leveraging Social Networking at Workplace | 0 | 0.34 | 2012 |
A Flexible Approach to Multisession Trust Negotiations | 3 | 0.43 | 2012 |
A rule-based policy language for selective trust propagation in social networks | 0 | 0.34 | 2011 |
Adaptive and Distributed Access Control in Cognitive Radio Networks | 5 | 0.69 | 2010 |
Advanced Trust Negotiations In Critical Infrastructures | 3 | 0.43 | 2010 |
Combining access control and trust negotiations in an On-line Social Network. | 3 | 0.46 | 2010 |
Identity-based long running negotiations | 5 | 0.51 | 2008 |
Introducing privacy in a hospital information system | 5 | 0.45 | 2008 |