Name
Papers
Collaborators
GIANLUCA LAX
92
49
Citations 
PageRank 
Referers 
358
38.52
494
Referees 
References 
2030
1377
Search Limit
1001000
Title
Citations
PageRank
Year
A Lightweight Scheme Exploiting Social Networks for Data Minimization According to the GDPR10.372021
A Blockchain-based approach for matching desired and real privacy settings of social network users00.342021
A Privacy-Preserving Localization Service for Assisted Living Facilities10.352020
A System for Privacy-Preserving Access Accountability in Critical Environments00.342019
Exploiting Digital Identity for Mobility in Fog Computing00.342019
A system to enforce user's preference in OSN advertising.00.342019
An Attribute-Based Privacy-Preserving Ethereum Solution for Service Delivery with Accountability Requirements00.342019
Ethereum Transactions and Smart Contracts among Secure Identities.00.342019
Integrating Digital Identity and Blockchain.00.342018
Contrasting Fake Reviews in TripAdvisor.00.342018
Contrasting False Identities in Social Networks by Trust Chains and Biometric Reinforcement00.342017
A Model for Handling Multiple Social Networks, its Implementation.00.342017
Discovering Good Links Between Objects in the Internet of Things.00.342017
eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security.00.342017
A System for Privacy-Preserving Analysis of Vehicle Movements.00.342017
Overcoming Limits of Blockchain for IoT Applications40.572017
Tweetchain: An Alternative to Blockchain for Crowd-Based Applications.40.412017
A model to support design and development of multiple-social-network applications90.522016
A Middleware to Allow Fine-Grained Access Control of Twitter Applications.00.342016
Interest Assortativity In Twitter10.352016
Range query integrity in the cloud: the case of video surveillance00.342016
A New Approach for Electronic Signature.10.362016
Analysis-preserving protection of user privacy against information leakage of social-network Likes130.622016
Implementing Advanced Electronic Signature by Public Digital Identity System (SPID).00.342016
Experimenting with Certified Reputation in a Competitive Multi-Agent Scenario.40.402016
Completeness, Correctness and Freshness of Cloud-Managed Data Streams.00.342016
A Threat to Friendship Privacy in Facebook.00.342016
Accountability-Preserving Anonymous Delivery of Cloud Services20.392015
Comparing Twitter and Facebook user behavior: Privacy and other aspects.50.452015
A lightweight electronic signature scheme using Twitter.10.362015
Practical and Secure Integrated PKE+PEKS with Keyword Privacy.10.352015
A Model Implementing Certified Reputation and Its Application to TripAdvisor10.352015
Discovering missing me edges across social networks210.622015
A privacy-preserving e-participation framework allowing citizen opinion analysis20.382015
A new form of assortativity in online social networks80.502015
Digital Document Signing: Vulnerabilities and Solutions40.442015
A system for extracting structural information from Social Network accounts100.602015
Enhancing Public Digital Identity System (SPID) to Prevent Information Leakage20.502015
Generating K-Anonymous Logs of People Tracing Systems in Surveilled Environments.00.342014
Moving from social networks to social internetworking scenarios: The crawling perspective200.642014
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks10.352014
A Privacy-Preserving Solution for Tracking People in Critical Environments60.462014
Social Signature: Signing by Tweeting.60.492014
A Model to Support Multi-Social-Network Applications.100.542014
A Trust-Based Approach to Clustering Agents on the Basis of Their Expertise20.372014
Bridge analysis in a Social Internetworking Scenario210.782013
Attacks on Confidentiality of Communications Between Stranger Organizations00.342013
Allowing Non-identifying Information Disclosure in Citizen Opinion Evaluation.50.452013
Allowing privacy-preserving analysis of social network likes.70.462013
Bridge-Driven Search in Social Internetworking Scenarios.00.342013
  • 1
  • 2