Found: 16
Select item for more details and to access through your institution.
Punishing Malicious Hosts with the Cryptographic Traces Approach.
- Published in:
- New Generation Computing, 2006, v. 24, n. 4, p. 351, doi. 10.1007/BF03037399
- By:
- Publication type:
- Article
Design and implementation of a lightweight online certificate validation service.
- Published in:
- Telecommunication Systems, 2009, v. 41, n. 3, p. 229, doi. 10.1007/s11235-009-9144-2
- By:
- Publication type:
- Article
Game-Theoretical Design of an Adaptive Distributed Dissemination Protocol for VANETs.
- Published in:
- Sensors (14248220), 2018, v. 18, n. 1, p. 294, doi. 10.3390/s18010294
- By:
- Publication type:
- Article
A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.
- Published in:
- Sensors (14248220), 2015, v. 15, n. 4, p. 9039, doi. 10.3390/s150409039
- By:
- Publication type:
- Article
Reducing the computational cost of the authentication process in SET protocol.
- Published in:
- Ingeniería y Desarrollo, 2010, n. 27, p. 1
- By:
- Publication type:
- Article
On collaborative anonymous communications in lossy networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 12, p. 2761, doi. 10.1002/sec.793
- By:
- Publication type:
- Article
On the Anonymity Risk of Time-Varying User Profiles.
- Published in:
- Entropy, 2017, v. 19, n. 5, p. 190, doi. 10.3390/e19050190
- By:
- Publication type:
- Article
Entropy-Based Privacy against Profiling of User Mobility.
- Published in:
- Entropy, 2015, v. 17, n. 6, p. 3913, doi. 10.3390/e17063913
- By:
- Publication type:
- Article
Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems.
- Published in:
- Entropy, 2014, v. 16, n. 3, p. 1586, doi. 10.3390/e16031586
- By:
- Publication type:
- Article
ℋ-OCSP: A protocol to reduce the processing burden in online certificate status validation.
- Published in:
- Electronic Commerce Research, 2008, v. 8, n. 4, p. 255, doi. 10.1007/s10660-008-9024-y
- By:
- Publication type:
- Article
Shall I post this now? Optimized, delay-based privacy protection in social networks.
- Published in:
- Knowledge & Information Systems, 2017, v. 52, n. 1, p. 113, doi. 10.1007/s10115-016-1010-4
- By:
- Publication type:
- Article
On the measurement of privacy as an attacker's estimation error.
- Published in:
- International Journal of Information Security, 2013, v. 12, n. 2, p. 129, doi. 10.1007/s10207-012-0182-5
- By:
- Publication type:
- Article
Reconciling privacy and efficient utility management in smart cities.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2014, v. 25, n. 1, p. 94, doi. 10.1002/ett.2708
- By:
- Publication type:
- Article
Technology, Computation and Artificial Intelligence to Improve the Web Ecosystem.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 24, p. 12506, doi. 10.3390/app122412506
- By:
- Publication type:
- Article
Query Profile Obfuscation by Means of Optimal Query Exchange between Users.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 5, p. 641, doi. 10.1109/TDSC.2012.16
- By:
- Publication type:
- Article
A novel dynamic reputation-based source routing protocol for mobile ad hoc networks.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2019, v. 2019, n. 1, p. N.PAG, doi. 10.1186/s13638-019-1375-7
- By:
- Publication type:
- Article