| Publication | Date of Publication | Type |
|---|
Mitigating the curse of dimensionality in data anonymization Modeling Decisions for Artificial Intelligence | 2024-02-23 | Paper |
Privacy-Preserving Computation of the Earth Mover’s Distance | 2023-03-21 | Paper |
Bistochastic Privacy | 2022-12-09 | Paper |
Differentially Private Data Sets Based on Microaggregation and Record Perturbation Modeling Decisions for Artificial Intelligence | 2022-11-04 | Paper |
Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds Information Sciences | 2020-09-08 | Paper |
Co-utile disclosure of private data in social networks Information Sciences | 2020-09-08 | Paper |
Self-enforcing protocols via co-utile reputation management Information Sciences | 2020-01-06 | Paper |
Discrimination- and privacy-aware patterns Data Mining and Knowledge Discovery | 2019-01-29 | Paper |
Some basics on privacy techniques, anonymization and their big data challenges Mathematics in Computer Science | 2018-11-01 | Paper |
Privacy-preserving and co-utile distributed social credit | 2018-06-15 | Paper |
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response IEEE Transactions on Computers | 2017-05-16 | Paper |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts IEEE Transactions on Computers | 2017-05-16 | Paper |
Generalization-based privacy preservation and discrimination prevention in data publishing and mining Data Mining and Knowledge Discovery | 2016-08-04 | Paper |
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts Information Sciences | 2016-07-11 | Paper |
Signatures in hierarchical certificateless cryptography: efficient constructions and provable security Information Sciences | 2016-07-08 | Paper |
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement Information Security and Cryptology | 2015-12-02 | Paper |
SENSITIVITY-INDEPENDENT DIFFERENTIAL PRIVACY VIA PRIOR KNOWLEDGE REFINEMENT International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems | 2015-09-30 | Paper |
Optimal data-independent noise for differential privacy Information Sciences | 2015-09-24 | Paper |
Robust distributed privacy-preserving secure aggregation in vehicular communication | 2015-08-10 | Paper |
Provably secure threshold public-key encryption with adaptive security and short ciphertexts Information Sciences | 2012-10-25 | Paper |
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation RFID. Security and Privacy | 2012-08-20 | Paper |
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol Information Sciences | 2012-07-13 | Paper |
Bridging broadcast encryption and group key agreement Lecture Notes in Computer Science | 2011-12-02 | Paper |
Fully distributed broadcast encryption Provable Security | 2011-09-16 | Paper |
scientific article; zbMATH DE number 5901694 (Why is no real title available?) | 2011-05-31 | Paper |
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts Information and Communications Security | 2010-12-17 | Paper |
Identity-based authenticated asymmetric group key agreement protocol Lecture Notes in Computer Science | 2010-07-20 | Paper |
On reliability indices of communication networks Computers & Mathematics with Applications | 2010-06-28 | Paper |
Simulatable certificateless two-party authenticated key agreement protocol Information Sciences | 2010-03-11 | Paper |
scientific article; zbMATH DE number 5633832 (Why is no real title available?) | 2009-11-16 | Paper |
A comparative study of microaggregation methods | 2009-07-23 | Paper |
Asymmetric Group Key Agreement Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
A Public-Key Protocol for Social Networks with Private Relationships Modeling Decisions for Artificial Intelligence | 2009-02-17 | Paper |
Privacy homomorphisms for social networks with private relationships Computer Networks | 2009-01-20 | Paper |
A Shared Steganographic File System with Error Correction Modeling Decisions for Artificial Intelligence | 2008-11-25 | Paper |
A polynomial-time approximation to optimal multivariate microaggregation Computers & Mathematics with Applications | 2008-05-14 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
A distributed architecture for scalable private RFID tag identification Computer Networks | 2007-06-04 | Paper |
Secure many-to-one symbol transmission for implementation on smart cards Computer Networks | 2007-06-04 | Paper |
Scalability and security in biased many-to-one communication Computer Networks | 2006-12-07 | Paper |
WATERMARKING NUMERICAL DATA IN THE PRESENCE OF NOISE International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems | 2006-09-12 | Paper |
scientific article; zbMATH DE number 5034474 (Why is no real title available?) | 2006-06-22 | Paper |
Modeling Decisions for Artificial Intelligence Lecture Notes in Computer Science | 2005-08-26 | Paper |
A CRITIQUE OF THE SENSITIVITY RULES USUALLY EMPLOYED FOR STATISTICAL TABLE PROTECTION International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems | 2004-11-01 | Paper |
ON THE SECURITY OF MICROAGGREGATION WITH INDIVIDUAL RANKING: ANALYTICAL ATTACKS International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems | 2004-11-01 | Paper |
Editorial: TRENDS IN AGGREGATION AND SECURITY ASSESSMENT FOR INFERENCE CONTROL IN STATISTICAL DATABASES International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems | 2004-11-01 | Paper |
Selecting potentially relevant records using re-identification methods New Generation Computing | 2004-10-01 | Paper |
scientific article; zbMATH DE number 2087736 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2087737 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2087725 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2080168 (Why is no real title available?) | 2004-08-04 | Paper |
Disclosure risk assessment in statistical data protection. Journal of Computational and Applied Mathematics | 2004-03-15 | Paper |
scientific article; zbMATH DE number 2044548 (Why is no real title available?) | 2004-02-18 | Paper |
scientific article; zbMATH DE number 2016114 (Why is no real title available?) | 2003-12-10 | Paper |
scientific article; zbMATH DE number 1986067 (Why is no real title available?) | 2003-09-26 | Paper |
Median-based aggregation operators for prototype construction in ordinal scales International Journal of Intelligent Systems | 2003-08-20 | Paper |
scientific article; zbMATH DE number 1950352 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1941261 (Why is no real title available?) | 2003-06-29 | Paper |
On the connections between statistical disclosure control for microdata and some artificial intelligence tools Information Sciences | 2003-06-09 | Paper |
scientific article; zbMATH DE number 1857510 (Why is no real title available?) | 2003-01-22 | Paper |
scientific article; zbMATH DE number 2015502 (Why is no real title available?) | 2003-01-01 | Paper |
Resampling for statistical confidentiality in contingency tables Computers & Mathematics with Applications | 2001-07-15 | Paper |
scientific article; zbMATH DE number 1394327 (Why is no real title available?) | 2000-02-01 | Paper |
scientific article; zbMATH DE number 1341865 (Why is no real title available?) | 1999-11-29 | Paper |
scientific article; zbMATH DE number 1107713 (Why is no real title available?) | 1998-04-03 | Paper |
Achieving rights untransferability with client-independent servers Designs, Codes and Cryptography | 1996-10-13 | Paper |
Distributed user identification by zero-knowledge access rights proving Information Processing Letters | 1992-06-28 | Paper |