Buchholz, Erik
76  Ergebnisse:
Personensuche X
?
2

SoK: Can Trajectory Generation Combine Privacy and Utility?:

Buchholz, Erik ; Abuadbba, Alsharif ; Wang, Shuo..
Proceedings on Privacy Enhancing Technologies.  2024 (2024)  3 - p. 75-93 , 2024
 
?
6

Reconstruction Attack on Differential Private Trajectory Pr..:

, In: Proceedings of the 38th Annual Computer Security Applications Conference,
Buchholz, Erik ; Abuadbba, Alsharif ; Wang, Shuo.. - p. 279-292 , 2022
 
?
8

Using Diffusion of Innovations Theory to Study Connective A..:

, In: Social, Cultural, and Behavioral Modeling; Lecture Notes in Computer Science,
Spann, Billy ; Maleki, Maryam ; Mead, Esther... - p. 131-140 , 2021
 
?
9

Applying an Epidemiological Model to Evaluate the Propagati..:

, In: Social, Cultural, and Behavioral Modeling; Lecture Notes in Computer Science,
 
?
 
?
12

Utilizing Public Blockchains for the Sybil-Resistant Bootst..:

, In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security,
Matzutt, Roman ; Pennekamp, Jan ; Buchholz, Erik. - p. 531-542 , 2020
 
?
13

Privacy-Preserving Production Process Parameter Exchange:

, In: Annual Computer Security Applications Conference,
Pennekamp, Jan ; Buchholz, Erik ; Lockner, Yannik... - p. 510-525 , 2020
 
1-15