Personensuche
X
?
Proceedings of the 38th Annual Computer Security Applications Conference ,
6
Reconstruction Attack on Differential Private Trajectory Pr..:
, In:
?
Social, Cultural, and Behavioral Modeling; Lecture Notes in Computer Science ,
8
Using Diffusion of Innovations Theory to Study Connective A..:
, In:
?
Social, Cultural, and Behavioral Modeling; Lecture Notes in Computer Science ,
9
Applying an Epidemiological Model to Evaluate the Propagati..:
, In:
?
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security ,
12
Utilizing Public Blockchains for the Sybil-Resistant Bootst..:
, In:
?
Annual Computer Security Applications Conference ,
13