A Lightweight Scheme Exploiting Social Networks for Data Minimization According to the GDPR | 1 | 0.37 | 2021 |
A Blockchain-based approach for matching desired and real privacy settings of social network users | 0 | 0.34 | 2021 |
A Privacy-Preserving Localization Service for Assisted Living Facilities | 1 | 0.35 | 2020 |
A System for Privacy-Preserving Access Accountability in Critical Environments | 0 | 0.34 | 2019 |
Exploiting Digital Identity for Mobility in Fog Computing | 0 | 0.34 | 2019 |
A system to enforce user's preference in OSN advertising. | 0 | 0.34 | 2019 |
An Attribute-Based Privacy-Preserving Ethereum Solution for Service Delivery with Accountability Requirements | 0 | 0.34 | 2019 |
Ethereum Transactions and Smart Contracts among Secure Identities. | 0 | 0.34 | 2019 |
Integrating Digital Identity and Blockchain. | 0 | 0.34 | 2018 |
Contrasting Fake Reviews in TripAdvisor. | 0 | 0.34 | 2018 |
Contrasting False Identities in Social Networks by Trust Chains and Biometric Reinforcement | 0 | 0.34 | 2017 |
A Model for Handling Multiple Social Networks, its Implementation. | 0 | 0.34 | 2017 |
Discovering Good Links Between Objects in the Internet of Things. | 0 | 0.34 | 2017 |
eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security. | 0 | 0.34 | 2017 |
A System for Privacy-Preserving Analysis of Vehicle Movements. | 0 | 0.34 | 2017 |
Overcoming Limits of Blockchain for IoT Applications | 4 | 0.57 | 2017 |
Tweetchain: An Alternative to Blockchain for Crowd-Based Applications. | 4 | 0.41 | 2017 |
A model to support design and development of multiple-social-network applications | 9 | 0.52 | 2016 |
A Middleware to Allow Fine-Grained Access Control of Twitter Applications. | 0 | 0.34 | 2016 |
Interest Assortativity In Twitter | 1 | 0.35 | 2016 |
Range query integrity in the cloud: the case of video surveillance | 0 | 0.34 | 2016 |
A New Approach for Electronic Signature. | 1 | 0.36 | 2016 |
Analysis-preserving protection of user privacy against information leakage of social-network Likes | 13 | 0.62 | 2016 |
Implementing Advanced Electronic Signature by Public Digital Identity System (SPID). | 0 | 0.34 | 2016 |
Experimenting with Certified Reputation in a Competitive Multi-Agent Scenario. | 4 | 0.40 | 2016 |
Completeness, Correctness and Freshness of Cloud-Managed Data Streams. | 0 | 0.34 | 2016 |
A Threat to Friendship Privacy in Facebook. | 0 | 0.34 | 2016 |
Accountability-Preserving Anonymous Delivery of Cloud Services | 2 | 0.39 | 2015 |
Comparing Twitter and Facebook user behavior: Privacy and other aspects. | 5 | 0.45 | 2015 |
A lightweight electronic signature scheme using Twitter. | 1 | 0.36 | 2015 |
Practical and Secure Integrated PKE+PEKS with Keyword Privacy. | 1 | 0.35 | 2015 |
A Model Implementing Certified Reputation and Its Application to TripAdvisor | 1 | 0.35 | 2015 |
Discovering missing me edges across social networks | 21 | 0.62 | 2015 |
A privacy-preserving e-participation framework allowing citizen opinion analysis | 2 | 0.38 | 2015 |
A new form of assortativity in online social networks | 8 | 0.50 | 2015 |
Digital Document Signing: Vulnerabilities and Solutions | 4 | 0.44 | 2015 |
A system for extracting structural information from Social Network accounts | 10 | 0.60 | 2015 |
Enhancing Public Digital Identity System (SPID) to Prevent Information Leakage | 2 | 0.50 | 2015 |
Generating K-Anonymous Logs of People Tracing Systems in Surveilled Environments. | 0 | 0.34 | 2014 |
Moving from social networks to social internetworking scenarios: The crawling perspective | 20 | 0.64 | 2014 |
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks | 1 | 0.35 | 2014 |
A Privacy-Preserving Solution for Tracking People in Critical Environments | 6 | 0.46 | 2014 |
Social Signature: Signing by Tweeting. | 6 | 0.49 | 2014 |
A Model to Support Multi-Social-Network Applications. | 10 | 0.54 | 2014 |
A Trust-Based Approach to Clustering Agents on the Basis of Their Expertise | 2 | 0.37 | 2014 |
Bridge analysis in a Social Internetworking Scenario | 21 | 0.78 | 2013 |
Attacks on Confidentiality of Communications Between Stranger Organizations | 0 | 0.34 | 2013 |
Allowing Non-identifying Information Disclosure in Citizen Opinion Evaluation. | 5 | 0.45 | 2013 |
Allowing privacy-preserving analysis of social network likes. | 7 | 0.46 | 2013 |
Bridge-Driven Search in Social Internetworking Scenarios. | 0 | 0.34 | 2013 |