43 results on '"RIOS, RUBEN"'
Search Results
2. Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies
3. Query Privacy in Sensing-as-a-Service Platforms
4. Distributed Detection of APTs: Consensus vs. Clustering
5. Privacy-Aware Trust Negotiation
6. Location Privacy in WSNs: Solutions, Challenges, and Future Trends
7. Preserving Receiver-Location Privacy in Wireless Sensor Networks
8. Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies
9. Query Privacy in Sensing-as-a-Service Platforms
10. Privacy-Aware Trust Negotiation
11. Preserving Receiver-Location Privacy in Wireless Sensor Networks
12. Location Privacy in WSNs: Solutions, Challenges, and Future Trends
13. Probabilistic Metric Spaces for Privacy by Design Machine Learning Algorithms: Modeling Database Changes
14. Lifelogging Protection Scheme for Internet-Based Personal Assistants
15. FHE-Compatible Batch Normalization for Privacy Preserving Deep Learning
16. A Performance and Resource Consumption Assessment of Secret Sharing Based Secure Multiparty Computation
17. A General Algorithm for k-anonymity on Dynamic Databases
18. On Security of Anonymous Invitation-Based System
19. YaPPL - A Lightweight Privacy Preference Language for Legally Sufficient and Automated Consent Provision in IoT Scenarios
20. PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution
21. -DOCA: Achieving Privacy in Data Streams
22. Pitchforks in Cryptocurrencies : Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper)
23. Privacy-Preserving Trade Chain Detection
24. Developing GDPR Compliant Apps for the Edge
25. Data Oblivious Genome Variants Search on Intel SGX
26. Post-processing Methods for High Quality Privacy-Preserving Record Linkage
27. Bootstrapping Online Trust: Timeline Activity Proofs
28. Privacy Risk Assessment: From Art to Science, by Metrics
29. Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis
30. Coloured Ring Confidential Transactions
31. What Blockchain Alternative Do You Need?
32. Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies
33. Avoiding Deadlocks in Payment Channel Networks
34. A Poisoning Attack Against Cryptocurrency Mining Pools
35. Valuable Puzzles for Proofs-of-Work
36. Self-reproducing Coins as Universal Turing Machine
37. Contour: A Practical System for Binary Transparency
38. Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption
39. Payment Network Design with Fees
40. On Symbolic Verification of Bitcoin’s script Language
41. Succinctly Verifiable Sealed-Bid Auction Smart Contract
42. Split Payments in Payment Networks
43. Blockchain-Based Fair Certified Notifications
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.