Publication | Date of Publication | Type |
---|
Mitigating the curse of dimensionality in data anonymization | 2024-02-23 | Paper |
Privacy-Preserving Computation of the Earth Mover’s Distance | 2023-03-21 | Paper |
Bistochastic Privacy | 2022-12-09 | Paper |
Differentially Private Data Sets Based on Microaggregation and Record Perturbation | 2022-11-04 | Paper |
Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds | 2020-09-08 | Paper |
Co-utile disclosure of private data in social networks | 2020-09-08 | Paper |
Self-enforcing protocols via co-utile reputation management | 2020-01-06 | Paper |
Discrimination- and privacy-aware patterns | 2019-01-29 | Paper |
Some basics on privacy techniques, anonymization and their big data challenges | 2018-11-01 | Paper |
Privacy-preserving and co-utile distributed social credit | 2018-06-15 | Paper |
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response | 2017-05-16 | Paper |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts | 2017-05-16 | Paper |
Generalization-based privacy preservation and discrimination prevention in data publishing and mining | 2016-08-04 | Paper |
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts | 2016-07-11 | Paper |
Signatures in hierarchical certificateless cryptography: efficient constructions and provable security | 2016-07-08 | Paper |
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement | 2015-12-02 | Paper |
SENSITIVITY-INDEPENDENT DIFFERENTIAL PRIVACY VIA PRIOR KNOWLEDGE REFINEMENT | 2015-09-30 | Paper |
Optimal data-independent noise for differential privacy | 2015-09-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q5500915 | 2015-08-10 | Paper |
Provably secure threshold public-key encryption with adaptive security and short ciphertexts | 2012-10-25 | Paper |
A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation | 2012-08-20 | Paper |
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol | 2012-07-13 | Paper |
Bridging Broadcast Encryption and Group Key Agreement | 2011-12-02 | Paper |
Fully Distributed Broadcast Encryption | 2011-09-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q3001166 | 2011-05-31 | Paper |
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts | 2010-12-17 | Paper |
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol | 2010-07-20 | Paper |
On reliability indices of communication networks | 2010-06-28 | Paper |
Simulatable certificateless two-party authenticated key agreement protocol | 2010-03-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q3645214 | 2009-11-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q5323590 | 2009-07-23 | Paper |
Asymmetric Group Key Agreement | 2009-05-12 | Paper |
A Public-Key Protocol for Social Networks with Private Relationships | 2009-02-17 | Paper |
Privacy homomorphisms for social networks with private relationships | 2009-01-20 | Paper |
A Shared Steganographic File System with Error Correction | 2008-11-25 | Paper |
A polynomial-time approximation to optimal multivariate microaggregation | 2008-05-14 | Paper |
Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
A distributed architecture for scalable private RFID tag identification | 2007-06-04 | Paper |
Secure many-to-one symbol transmission for implementation on smart cards | 2007-06-04 | Paper |
Scalability and security in biased many-to-one communication | 2006-12-07 | Paper |
WATERMARKING NUMERICAL DATA IN THE PRESENCE OF NOISE | 2006-09-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q5473472 | 2006-06-22 | Paper |
Modeling Decisions for Artificial Intelligence | 2005-08-26 | Paper |
Editorial: TRENDS IN AGGREGATION AND SECURITY ASSESSMENT FOR INFERENCE CONTROL IN STATISTICAL DATABASES | 2004-11-01 | Paper |
ON THE SECURITY OF MICROAGGREGATION WITH INDIVIDUAL RANKING: ANALYTICAL ATTACKS | 2004-11-01 | Paper |
A CRITIQUE OF THE SENSITIVITY RULES USUALLY EMPLOYED FOR STATISTICAL TABLE PROTECTION | 2004-11-01 | Paper |
Selecting potentially relevant records using re-identification methods | 2004-10-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4738642 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4738659 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4738660 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472395 | 2004-08-04 | Paper |
Disclosure risk assessment in statistical data protection. | 2004-03-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4448419 | 2004-02-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4438836 | 2003-12-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4429510 | 2003-09-26 | Paper |
Median-based aggregation operators for prototype construction in ordinal scales | 2003-08-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4412988 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4408469 | 2003-06-29 | Paper |
On the connections between statistical disclosure control for microdata and some artificial intelligence tools | 2003-06-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4788559 | 2003-01-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4438285 | 2003-01-01 | Paper |
Resampling for statistical confidentiality in contingency tables | 2001-07-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4934744 | 2000-02-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4263420 | 1999-11-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373663 | 1998-04-03 | Paper |
Achieving rights untransferability with client-independent servers | 1996-10-13 | Paper |
Distributed user identification by zero-knowledge access rights proving | 1992-06-28 | Paper |