Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 52 matches
- 2024
- Yunguo Guan, Rongxing Lu, Songnian Zhang, Yandong Zheng, Jun Shao, Guiyi Wei:
Efficient and Privacy-Preserving Aggregate Query Over Public Property Graphs. IEEE Trans. Big Data 10(2): 146-157 (2024) - Claudio Novelli, Federico Casolari, Philipp Hacker, Giorgio Spedicato, Luciano Floridi:
Generative AI in EU Law: Liability, Privacy, Intellectual Property, and Cybersecurity. CoRR abs/2401.07348 (2024) - 2023
- Immanuel Kunz, Konrad Weiss, Angelika Schneider, Christian Banse:
Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis. Proc. Priv. Enhancing Technol. 2023(2): 171-187 (2023) - James Wright, Stephen D. Wolthusen:
A Contextual Integrity Property to Impede Privacy Violations in 5G Networks. Critical Infrastructure Protection 2023: 115-139 - 2022
- Yanyan Ji, Bilin Shao, Jinyong Chang, Genqing Bian:
Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property. Clust. Comput. 25(1): 337-349 (2022) - Yubo Zhao, Jinyong Chang:
Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage. Comput. Networks 216: 109270 (2022) - Michael Birnhack, Tal Morse:
Digital remains: property or privacy? Int. J. Law Inf. Technol. 30(3): 280-301 (2022) - Chuxin Zhuang, Qingyun Dai, Yue Zhang:
BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. Peer-to-Peer Netw. Appl. 15(1): 724-738 (2022) - Yi Li, Yuling Tian:
A Lightweight and Secure Three-Factor Authentication Protocol With Adaptive Privacy-Preserving Property for Wireless Sensor Networks. IEEE Syst. J. 16(4): 6197-6208 (2022) - 2021
- Wen Huang, Shijie Zhou, Yongjian Liao:
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries. IEEE Trans. Inf. Forensics Secur. 16: 3123-3137 (2021) - 2020
- Fan Wu, Xiong Li, Lili Xu, Saru Kumari:
A privacy-preserving scheme with identity traceable property for smart grid. Comput. Commun. 157: 38-44 (2020) - Michael Carl Tschantz, Shayak Sen, Anupam Datta:
SoK: Differential Privacy as a Causal Property. SP 2020: 354-371 - Wen Huang, Shijie Zhou, Yongjian Liao:
Unexpected Information Leakage of Differential Privacy Due to Linear Property of Queries. CoRR abs/2010.08958 (2020) - 2019
- Arisa Ema, Hirotaka Osawa, Reina Saijo, Akinori Kubo, Takushi Otani, Hiromitsu Hattori, Naonori Akiya, Nobutsugu Kanzaki, Minao Kukita, Kazunori Komatani, Ryutaro Ichise:
Clarifying Privacy, Property, and Power: Case Study on Value Conflict Between Communities. Proc. IEEE 107(3): 575-581 (2019) - Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, Elisa Bertino:
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol. CCS 2019: 669-684 - Peter Burgstaller:
Awareness of Privacy and Intellectual Property Rights under the Economic Partnership Agreement between EU and Japan. iCAST 2019: 1-4 - 2018
- Anna C. Gilbert, Audra McMillan:
Property Testing For Differential Privacy. Allerton 2018: 249-258 - Anna C. Gilbert, Audra McMillan:
Property Testing for Differential Privacy. CoRR abs/1806.06427 (2018) - 2017
- Dileep Kumar Koshley, Sapana Rani, Raju Halder:
Towards Generalization of Privacy Policy Specification and Property-Based Information Leakage. ICISS 2017: 68-87 - Michael Carl Tschantz, Shayak Sen, Anupam Datta:
Differential Privacy as a Causal Property. CoRR abs/1710.05899 (2017) - (Withdrawn) Improved Hybrid Consensus Scheme with Privacy-preserving Property. IACR Cryptol. ePrint Arch. 2017: 192 (2017)
- 2016
- Dylan Eric Wittkower:
Lurkers, creepers, and virtuous interactivity: From property rights to consent and care as a conceptual basis for privacy concerns and information ethics. First Monday 21(10) (2016) - 2014
- Changsha Ma, Kaiping Xue, Peilin Hong:
Distributed access control with adaptive privacy preserving property for wireless sensor networks. Secur. Commun. Networks 7(4): 759-773 (2014) - Yoon-Su Jeong, Sang-Ho Lee, Seung-Soo Shin:
Access Control Protocol Based on Privacy Property of Patient in m-Healthcare Emergency. Wirel. Pers. Commun. 79(4): 2565-2578 (2014) - Fabian Yamaguchi, Nico Golde, Daniel Arp, Konrad Rieck:
Modeling and Discovering Vulnerabilities with Code Property Graphs. IEEE Symposium on Security and Privacy 2014: 590-604 - 2013
- Kashyap Dixit, Madhav Jha, Sofya Raskhodnikova, Abhradeep Thakurta:
Testing the Lipschitz Property over Product Distributions with Applications to Data Privacy. TCC 2013: 418-436 - 2012
- Kashyap Dixit, Madhav Jha, Abhradeep Thakurta:
Testing Lipschitz Property over Product Distribution and its Applications to Statistical Data Privacy. CoRR abs/1209.4056 (2012) - 2011
- Bill D. Herman:
Review article: New media law and policy: Helen Nissenbaum, Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, CA: Stanford Law Books, 2009. xiv + 288 pp. ISBN 9780804752374, $24.95 (pbk) Thomas Gibbons (ed.) Free Speech in the New Media. Farnham, Surrey, UK: Ashgate, 2009. xxiii + 557 pp. ISBN 9780754627913, $300 (hbk) Edward Lee Lamoureux, Steven L. Baron, and Claire Stewart, Intellectual Property Law and Interactive Media: Free for a Fee. New York: Peter Lang, 2009. xii + 298 pp. ISBN 9780820481609, $32.95 (pbk). New Media Soc. 13(2): 350-356 (2011) - Amina Hossain, Al-Amin Hossain, Jae-Woo Chang:
Spatial Cloaking Method Based on Reciprocity Property for Users' Privacy in Road Networks. CIT 2011: 487-490 - Xing-Lan Zhang, Weiwei Liu:
Improving Privacy of Property-based Attestation without a Trusted Third Party. CIS 2011: 559-563
skipping 22 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-09 08:28 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint