Filter your results
- 17
- 17
- 17
- 4
- 2
- 1
- 1
- 1
- 1
- 3
- 5
- 1
- 2
- 17
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Anonygator: Privacy and Integrity Preserving Data AggregationACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.85-106, ⟨10.1007/978-3-642-16955-7_5⟩
Conference papers
hal-01055270v1
|
||
|
Open Research Questions of Privacy-Enhanced Event Scheduling1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.9-19, ⟨10.1007/978-3-642-19228-9_2⟩
Conference papers
hal-01581331v1
|
||
|
Generic Constructions of Biometric Identity Based Encryption Systems4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.90-105, ⟨10.1007/978-3-642-12368-9_7⟩
Conference papers
hal-01056064v1
|
||
|
Secure Obfuscation of Authoring Style9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.88-103, ⟨10.1007/978-3-319-24018-3_6⟩
Conference papers
hal-01442555v1
|
||
|
Privacy Consensus in Anonymization Systems via Game Theory26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.74-89, ⟨10.1007/978-3-642-31540-4_6⟩
Conference papers
hal-01534775v1
|
||
|
Practical Revocable Anonymous Credentials13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.211-213, ⟨10.1007/978-3-642-32805-3_22⟩
Conference papers
hal-01540883v1
|
||
|
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.114-121, ⟨10.1007/978-3-642-31540-4_9⟩
Conference papers
hal-01534767v1
|
||
|
Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.237-258, ⟨10.1007/978-3-030-81242-3_14⟩
Conference papers
hal-03677025v1
|
||
|
Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.409-415, ⟨10.1007/978-3-642-36818-9_45⟩
Conference papers
hal-01480254v1
|
||
|
DO NOT DISTURB? Classifier Behavior on Perturbed Datasets1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.155-173, ⟨10.1007/978-3-319-66808-6_11⟩
Conference papers
hal-01677128v1
|
||
|
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge BasesInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.251-266, ⟨10.1007/978-3-319-45507-5_17⟩
Conference papers
hal-01635002v1
|
||
|
Anonymous Lattice-Based Broadcast Encryption1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.353-362, ⟨10.1007/978-3-642-36818-9_39⟩
Conference papers
hal-01480192v1
|
||
|
Distributed Data Federation without Disclosure of User Existence26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.282-297, ⟨10.1007/978-3-642-31540-4_22⟩
Conference papers
hal-01534759v1
|
||
|
Achieving Anonymity against Major Face Recognition Algorithms14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.18-33, ⟨10.1007/978-3-642-40779-6_2⟩
Conference papers
hal-01492830v1
|
||
|
Transparency Heuristic: Effect of Implicitness of Online Data Acquisition on Sensitivity Perception17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.676-679, ⟨10.1007/978-3-030-29390-1_61⟩
Conference papers
hal-02878652v1
|
||
|
Enhanced Privacy Protection in Blockchain Using SGX and Sidechains4th International Conference on Computational Intelligence in Data Science (ICCIDS), Mar 2021, Chennai, India. pp.200-209, ⟨10.1007/978-3-030-92600-7_19⟩
Conference papers
hal-03772926v1
|
||
|
k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.263-273, ⟨10.1007/978-3-642-31540-4_20⟩
Conference papers
hal-01534772v1
|