|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 32 occurrences of 27 keywords
|
|
|
Results
Found 90 publication records. Showing 90 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
44 | Jan Porekar, Aljosa Jerman-Blazic, Tomaz Klobucar |
Towards Organizational Privacy Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: Second International Conference on the Digital Society (ICDS 2008), February 10-15, 2008, Sainte Luce, Martinique, France, pp. 15-19, 2008, IEEE Computer Society, 978-0-7695-3087-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PET – privacy enhancing technologies, privacy, patterns |
40 | Serge Vaudenay |
On Privacy Models for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 68-87, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Xiaodong Lin 0001, Rongxing Lu, Xuemin Shen, Yoshiaki Nemoto, Nei Kato |
Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 27(4), pp. 365-378, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Ching Yu Ng, Willy Susilo, Yi Mu 0001, Reihaneh Safavi-Naini |
RFID Privacy Models Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 251-266, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann |
Anonymizer-Enabled Security and Privacy for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 134-153, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd |
Low-Cost and Strong-Security RFID Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 795-807, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
strong-privacy, authentication, traceability, RFID system, indistinguishability |
31 | Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Elisa Bertino |
Private record matching using differential privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings, pp. 123-134, 2010, ACM, 978-1-60558-945-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, privacy, differential privacy, record matching |
31 | Zhenyu Zhong, Lakshmish Ramaswamy, Kang Li 0001 |
ALPACAS: A Large-Scale Privacy-Aware Collaborative Anti-Spam System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 556-564, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Ari Juels, Stephen A. Weis |
Defining Strong Privacy for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2007), 19-23 March 2007, White Plains, New York, USA, pp. 342-347, 2007, IEEE Computer Society, 978-0-7695-2788-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Jeong Su Park, Su-Mi Lee, Eun Young Choi, Dong Hoon Lee 0001 |
Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 316-325, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Qiong Wei, Yansheng Lu, Qiang Lou |
Privacy-Preserving Data Publishing Based on De-clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA, pp. 152-157, 2008, IEEE Computer Society, 978-0-7695-3131-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
de-clustering, privacy-preserving |
27 | Andrew S. Patrick, Steve Kenny |
From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers, pp. 107-124, 2003, Springer, 3-540-20610-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Ivan Damgård, Michael Østergaard Pedersen |
RFID Security: Tradeoffs between Security and Efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 318-332, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Serge Vaudenay |
RFID Privacy Based on Public-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, pp. 1-6, 2006, Springer, 3-540-49112-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede |
Low-cost untraceable authentication protocols for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 55-64, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
search protocol, tracking attack, privacy, elliptic curve cryptography, authentication protocol, rfid |
19 | Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, Elisa Bertino |
A Hybrid Technique for Private Location-Based Queries with Database Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSTD ![In: Advances in Spatial and Temporal Databases, 11th International Symposium, SSTD 2009, Aalborg, Denmark, July 8-10, 2009, Proceedings, pp. 98-116, 2009, Springer, 978-3-642-02981-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Xiaokui Xiao, Yufei Tao 0001 |
Dynamic anonymization: accurate statistical analysis with privacy preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 107-120, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
m-invariance, dynamic anonymization, privacy, statistical database |
18 | Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan |
A Correct, Private, and Efficient Mix Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 439-454, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Georgia Tsaloli, Aikaterini Mitrokotsa |
Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (2) ![In: Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, ICETE 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019., pp. 425-430, 2019, SciTePress, 978-989-758-378-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Yufei Tao 0001, Xiaokui Xiao, Jiexing Li, Donghui Zhang |
On Anti-Corruption Privacy Preserving Publication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 725-734, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Carsten Rudolph |
Covert Identity Information in Direct Anonymous Attestation (DAA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 443-448, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Adam Barth, Dan Boneh, Brent Waters |
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 52-64, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Peng Chen, Jixin Zhang, Jiageng Chen, Weizhi Meng 0001 |
MLCT: A multi-level contact tracing scheme with strong privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 35(19), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Lin Liu 0018, Jinshu Su, Ximeng Liu, Rongmao Chen, Xinyi Huang 0001, Guang Kou, Shaojing Fu |
Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cloud Comput. ![In: IEEE Trans. Cloud Comput. 11(3), pp. 3211-3225, July - September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Temilola Adeleye, Skye Berghel, Damien Desfontaines, Michael Hay, Isaac Johnson 0001, Cléo Lemoisson, Ashwin Machanavajjhala, Tom Magerlein, Gabriele Modena, David Pujol, Daniel Simmons-Marengo, Hal Triedman |
Publishing Wikipedia usage data with strong privacy guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.16298, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Chang Xu 0004, Ruijuan Wang, Liehuang Zhu, Chuan Zhang 0003, Rongxing Lu, Kashif Sharif |
Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Big Data ![In: IEEE Trans. Big Data 9(3), pp. 805-817, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Jingwei Liu, Zihan Zhou, Rong Sun, Xiaojiang Du, Mohsen Guizani |
A Strong Privacy-Preserving and Efficient Fingerprint Authentication via Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2023, Kuala Lumpur, Malaysia, December 4-8, 2023, pp. 5889-5894, 2023, IEEE, 979-8-3503-1090-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Ningning Cui, Zheli Deng, Man Li, Yuliang Ma, Jie Cui 0004, Hong Zhong 0001 |
Authenticated Ranked Keyword Search over Encrypted Data with Strong Privacy Guarantee. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA (1) ![In: Database Systems for Advanced Applications - 28th International Conference, DASFAA 2023, Tianjin, China, April 17-20, 2023, Proceedings, Part I, pp. 644-660, 2023, Springer, 978-3-031-30636-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Jiahui Wu, Nankun Mu, Xinyu Lei, Junqing Le, Di Zhang, Xiaofeng Liao 0001 |
SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cloud Comput. ![In: IEEE Trans. Cloud Comput. 10(1), pp. 691-705, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Wenli Wang, Zhuliang Jia, Mengfan Xu, Shundong Li |
SPCS: Strong Privacy-Preserving-Constrained Shortest Distance Queries on Encrypted Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(22), pp. 22516-22528, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Chang Xu 0004, Ruijuan Wang, Liehuang Zhu, Chuan Zhang 0003, Rongxing Lu, Kashif Sharif |
Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.13662, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Chuan Zhang 0003, Mingyang Zhao, Liehuang Zhu, Tong Wu 0011, Ximeng Liu |
Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 17, pp. 3569-3581, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Sunday Oyinlola Ogundoyin, Ismaila Adeniyi Kamil |
An efficient authentication scheme with strong privacy preservation for fog-assisted vehicular ad hoc networks based on blockchain and neuro-fuzzy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Veh. Commun. ![In: Veh. Commun. 31, pp. 100384, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Iulian Sandu Popa, Dai Hai Ton That, Karine Zeitouni, Cristian Borcea |
Mobile participatory sensing with strong privacy guarantees using secure probes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GeoInformatica ![In: GeoInformatica 25(3), pp. 533-580, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Isabel Wagner, Iryna Yevseyeva |
Designing Strong Privacy Metrics Suites Using Evolutionary Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Priv. Secur. ![In: ACM Trans. Priv. Secur. 24(2), pp. 12:1-12:35, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Saskia Nuñez von Voigt, Erik Daniel, Florian Tschorsch |
Self-Determined Reciprocal Recommender System with Strong Privacy Guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2107.06590, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
13 | Mingzhen Li, Yunfeng Wang, Yang Xin 0001, Hongliang Zhu, Qifeng Tang, Yuling Chen, Yixian Yang, Guangcan Yang |
Cross-Platform Strong Privacy Protection Mechanism for Review Publication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2021, pp. 5556155:1-5556155:22, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Saskia Nuñez von Voigt, Erik Daniel, Florian Tschorsch |
Self-Determined Reciprocal Recommender Systemwith Strong Privacy Guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021, pp. 31:1-31:6, 2021, ACM, 978-1-4503-9051-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Saba Eskandarian |
Strong privacy for communication, browsing, and storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
13 | Ni Trieu, Kareem Shehata, Prateek Saxena, Reza Shokri, Dawn Song |
Epione: Lightweight Contact Tracing with Strong Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Data Eng. Bull. ![In: IEEE Data Eng. Bull. 43(2), pp. 95-107, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Jianbing Ni, Kuan Zhang 0001, Qi Xia, Xiaodong Lin 0001, Xuemin Sherman Shen |
Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 19(6), pp. 1317-1331, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Wenting Shen, Ye Su, Rong Hao |
Lightweight Cloud Storage Auditing With Deduplication Supporting Strong Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 44359-44372, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Wenhao Zhan, Leighton Pate Barnes, Ayfer Özgür |
Strong Privacy and Utility Guarantee: Over-the-Air Statistical Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2010.13531, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Ni Trieu, Kareem Shehata, Prateek Saxena, Reza Shokri, Dawn Song |
Epione: Lightweight Contact Tracing with Strong Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2004.13293, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Zhiguo Wan, Xiaotong Liu |
ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 630, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Chen Fang, Yuanbo Guo, Na Wang, Ankang Ju |
Highly efficient federated learning with strong privacy preservation in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 96, pp. 101889, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Chih-Wei Shiu, Yu-Chi Chen, Wien Hong |
Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 13(2), pp. 1020-1042, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Denys Proux, Frédéric Roulland |
Mobile recommendation challenges within a strong privacy oriented paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LocalRec@SIGSPATIAL ![In: Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Location-based Recommendations, Geosocial Networks and Geoadvertising, LocalRec@SIGSPATIAL 2019, Chicago, Illinois, USA, November 5, 2019., pp. 7:1-7:9, 2019, ACM, 978-1-4503-6963-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Raffael Bild, Klaus A. Kuhn, Fabian Prasser |
SafePub: A Truthful Data Anonymization Algorithm With Strong Privacy Guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2018(1), pp. 67-87, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Jan Hajny, Petr Dzurenda, Lukas Malina |
Multidevice Authentication with Strong Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Commun. Mob. Comput. ![In: Wirel. Commun. Mob. Comput. 2018, pp. 3295148:1-3295148:12, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Jianbing Ni, Kuan Zhang 0001, Qi Xia, Xiaodong Lin 0001, Xuemin Shen |
Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1806.04057, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Sangil Jeon, Jaewon Noh, Jeehyeong Kim, Sunghyun Cho |
Strong privacy preserving authentication scheme for unmanned cars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE ![In: IEEE International Conference on Consumer Electronics, ICCE 2018, Las Vegas, NV, USA, January 12-14, 2018, pp. 1-4, 2018, IEEE, 978-1-5386-3025-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnés, Bernhard Seefeld |
Prochlo: Strong Privacy for Analytics in the Crowd. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1710.00901, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
13 | Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnés, Bernhard Seefeld |
Prochlo: Strong Privacy for Analytics in the Crowd. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 26th Symposium on Operating Systems Principles, Shanghai, China, October 28-31, 2017, pp. 441-459, 2017, ACM, 978-1-4503-5085-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
13 | Jan Tozicka, Antonín Komenda, Michal Stolba |
ε-Strong Privacy Preserving Multiagent Planner by Computational Tractability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAART (1) ![In: Proceedings of the 9th International Conference on Agents and Artificial Intelligence, ICAART 2017, Volume 1, Porto, Portugal, February 24-26, 2017., pp. 51-57, 2017, SciTePress, 978-989-758-219-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
13 | Antonín Komenda, Jan Tozicka, Michal Stolba |
ε-Strong Privacy Preserving Multi-agent Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAART (Revised Selected Papers) ![In: Agents and Artificial Intelligence - 9th International Conference, ICAART 2017, Porto, Portugal, February 24-26, 2017, Revised Selected Papers, pp. 137-156, 2017, Springer, 978-3-319-93580-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
13 | You Zhou 0003, Yian Zhou, Shigang Chen, Samuel S. Wu |
Achieving Strong Privacy in Online Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017, pp. 710-719, 2017, IEEE Computer Society, 978-1-5386-1792-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
13 | Jan Tozicka, Michal Stolba, Antonín Komenda |
The Limits of Strong Privacy Preserving Multi-Agent Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAPS ![In: Proceedings of the Twenty-Seventh International Conference on Automated Planning and Scheduling, ICAPS 2017, Pittsburgh, Pennsylvania, USA, June 18-23, 2017., pp. 297-305, 2017, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
13 | David Förster, Frank Kargl, Hans Löhr |
PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Networks ![In: Ad Hoc Networks 37, pp. 122-132, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
13 | Rui Li 0020, Alex X. Liu, Ann L. Wang, Bezawada Bruhadeshwar |
Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 24(4), pp. 2305-2318, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
13 | Mingzhong Wang, Dan Liu 0002, Liehuang Zhu, Yongjun Xu, Fei Wang 0014 |
LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing ![In: Computing 98(7), pp. 685-708, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
13 | Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Shlomi Dolev |
Local Self-Organization with Strong Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trustcom/BigDataSE/ISPA ![In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016, pp. 775-782, 2016, IEEE, 978-1-5090-3205-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
13 | Hoang Giang Do, Wee Keong Ng |
Multidimensional range query on outsourced database with strong privacy guarantee. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016, pp. 555-560, 2016, IEEE, 978-1-5090-4379-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
13 | Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Mehmet Sabir Kiraz, Hüseyin Demirci, Albert Levi |
k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Commun. Mob. Comput. ![In: Wirel. Commun. Mob. Comput. 15(18), pp. 2150-2166, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
13 | Bing Wang 0005, Wei Song 0006, Wenjing Lou, Y. Thomas Hou 0001 |
Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: 2015 IEEE Conference on Computer Communications, INFOCOM 2015, Kowloon, Hong Kong, April 26 - May 1, 2015, pp. 2092-2100, 2015, IEEE, 978-1-4799-8381-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
13 | Rui Li 0020, Alex X. Liu, Ann L. Wang, Bezawada Bruhadeshwar |
Fast Range Query Processing with Strong Privacy Protection for Cloud Computing. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. VLDB Endow. ![In: Proc. VLDB Endow. 7(14), pp. 1953-1964, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
13 | Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi |
SDPP: an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 6(3), pp. 241-269, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
13 | Raghuvir Songhela, Manik Lal Das |
Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPACE ![In: Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings, pp. 171-182, 2014, Springer, 978-3-319-12059-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
13 | Jian Shen 0001, Haowen Tan, Yuhui Zheng, Sai Ji, Jin Wang 0001 |
An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS ![In: Intelligent Systems and Applications - Proceedings of the International Computer Symposium (ICS) held at Taichung, Taiwan, December 12-14, 2014, pp. 2070-2079, 2014, IOS Press, 978-1-61499-483-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
13 | Nicolas Anciaux, Benjamin Nguyen, Iulian Sandu Popa |
Tutorial: Managing Personal Data with Strong Privacy Guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Proceedings of the 17th International Conference on Extending Database Technology, EDBT 2014, Athens, Greece, March 24-28, 2014., pp. 672-673, 2014, OpenProceedings.org. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
13 | Nan Li 0007, Yi Mu 0001, Willy Susilo, Fuchun Guo, Vijay Varadharajan |
On RFID Authentication Protocols with Wide-Strong Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFIDSec Asia ![In: Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop Proceedings, Guangzhou, China, November 27, 2013, pp. 3-16, 2013, IOS Press, 978-1-61499-327-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
13 | Da-Zhi Sun, Ji-Dong Zhong |
A hash-based RFID security protocol for strong privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 58(4), pp. 1246-1252, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
13 | Khaled Ouafi, Serge Vaudenay |
Strong Privacy for RFID Systems from Plaintext-Aware Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 247-262, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
13 | Yipin Sun, Rongxing Lu, Xiaodong Lin 0001, Xuemin Shen, Jinshu Su |
An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 59(7), pp. 3589-3603, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
13 | Lukasz Krzywiecki, Miroslaw Kutylowski |
Lagrangian E-Voting: Verifiability on Demand and Strong Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings, pp. 109-123, 2010, Springer, 978-3-642-13868-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
13 | Ari Juels, Stephen A. Weis |
Defining strong privacy for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 13(1), pp. 7:1-7:23, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Eun Young Choi, Su-Mi Lee, Dong Hoon Lee 0001 |
Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 1171-1180, 2007, Springer, 978-3-540-73548-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RFID-tagged Banknotes, Self-updating, Privacy protection |
13 | Ari Juels, Stephen A. Weis |
Defining Strong Privacy for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 137, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
13 | Ronggong Song, Larry Korba |
Pay-TV system with strong privacy and non-repudiation protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 49(2), pp. 408-413, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan |
Non-interactive Auction Schemewith Strong Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 407-420, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Scott E. Coull, Matthew Green 0001, Susan Hohenberger |
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 501-520, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Xiaoming Wang, Bin B. Zhu, Shipeng Li 0001 |
A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 298-310, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
7 | Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vincent Naessens, Bart De Decker |
Extending the Belgian eID Technology with Mobile Security Functionality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSec ![In: Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, pp. 97-109, 2009, Springer, 978-3-642-04433-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Identity Technology, Security, Privacy, Mobile Access |
7 | Michel Banâtre, Fabien Allard, Paul Couderc |
Ubi-Check: A Pervasive Integrity Checking System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEW2AN ![In: Smart Spaces and Next Generation Wired/Wireless Networking, 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009. Proceedings, pp. 89-96, 2009, Springer, 978-3-642-04188-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Octavian Catrina, Florian Kerschbaum |
Fostering the Uptake of Secure Multiparty Computation in E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 693-700, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
e-commerce, cryptographic protocol, secure multiparty computation |
7 | Haruhisa Ichikawa, Masashi Shimizu, Kazunori Akabane |
Invited Talk: Appliance Defined Ubiquitous Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 20, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Wireless Appliance, Architectural Principles, DROF, Post-IP, RFID, Sensor, Stream, Ubiquitous Network |
7 | Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang 0001 |
Extended Private Information Retrieval and Its Application in Biometrics Authentications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 175-193, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
7 | Georgi Graschew, Theo A. Roelofs, Stefan Rakowsky, Peter M. Schlag, Sahin Albayrak, Silvan Kaiser |
Telemedical Applications and Grid Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGC ![In: Advances in Grid Computing - EGC 2005, European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers, pp. 1-5, 2005, Springer, 3-540-26918-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
7 | Roberto Tamassia, Danfeng Yao, William H. Winsborough |
Role-based cascaded delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 146-155, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
access control, RBAC, trust management, delegation |
7 | Giovanni Di Crescenzo |
Private Selective Payment Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 72-89, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #90 of 90 (100 per page; Change: )
|
|