Filter your results
- 11
- 10
- 1
- 11
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 1
- 1
- 11
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.17-35, ⟨10.1007/978-3-642-29852-3_2⟩
Conference papers
hal-01517652v1
|
||
|
A Privacy Risk Model for Trajectory Data8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.125-140, ⟨10.1007/978-3-662-43813-8_9⟩
Conference papers
hal-01381683v1
|
||
|
Information Security and Privacy – Challenges and OutlookAdvancing Research in Information and Communication Technology, AICT-600, pp.383-401, 2021, ⟨10.1007/978-3-030-81701-5_16⟩
Book sections
hal-03325978v1
|
||
|
VIGraph – A Framework for Verifiable Information11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.12-20, ⟨10.1007/978-3-319-59171-1_2⟩
Conference papers
hal-01651163v1
|
||
|
Rendering unto Cæsar the Things That Are Cæsar’s: Complex Trust Models and Human Understanding6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.191-200, ⟨10.1007/978-3-642-29852-3_13⟩
Conference papers
hal-01517660v1
|
||
|
A Framework for Blockchain-Based Verification of Integrity and Authenticity13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.196-208, ⟨10.1007/978-3-030-33716-2_15⟩
Conference papers
hal-03182608v1
|
||
|
Bringing the Virtual to the Farmers' Market: Designing for Trust in Pervasive Computing Systems4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.248-262, ⟨10.1007/978-3-642-13446-3_17⟩
Conference papers
hal-01061331v1
|
||
|
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.223-234, ⟨10.1007/978-3-642-21424-0_18⟩
Conference papers
hal-01567594v1
|
||
|
Reflections on Measuring the Trust Empowerment Potential of a Digital Environment7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.127-135, ⟨10.1007/978-3-642-38323-6_9⟩
Conference papers
hal-01468736v1
|
||
|
Lightweight Practical Private One-Way Anonymous Messaging9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.76-91, ⟨10.1007/978-3-319-18491-3_6⟩
Conference papers
hal-01416208v1
|
||
|
A Model for Personalised Perception of Policies10th IFIP International Conference on Trust Management (TM), Jul 2016, Darmstadt, Germany. pp.52-62, ⟨10.1007/978-3-319-41354-9_4⟩
Conference papers
hal-01438348v1
|