Search results for: Emmanouil Magkos
Lecture Notes in Computer Science > Electronic Commerce and Web Technologies > Security and Fairness > 72-83
Lecture Notes in Computer Science > Computational Linguistics and Intelligent Text Processing > Information Retrieval and Text Comparison > 535-546
Lecture Notes in Computer Science > Electronic Commerce and Web Technologies > Security Aspects > 186-195
Lecture Notes in Computer Science > Privacy in Statistical Databases > Privacy-Preserving Data Mining and Private Information Retrieval > 284-297
Lecture Notes in Computer Science
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Security and Privacy in Mobile Information and Communication Systems > Session 2: Identity and Privacy II > 53-64
Computer Communications > 2016 > 73 > PB > 263-270
Security and Communication Networks > 9 > 2 > 94 - 105
International Journal of Critical Infrastructure Protection > 2012 > 5 > 3-4 > 118-126
Data & Knowledge Engineering > 2009 > 68 > 11 > 1224-1236
Journal of Computer Virology and Hacking Techniques > 2009 > 5 > 4 > 357-364
Computers & Security > 2008 > 27 > 7-8 > 298-308
Journal of Computer Virology and Hacking Techniques > 2007 > 3 > 2 > 87-92