Murdoch, 2013
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Wu et al. | An effective approach for the protection of user commodity viewing privacy in e-commerce website | |
| Ren et al. | Privacy-preserving using homomorphic encryption in Mobile IoT systems | |
| US10181043B1 (en) | Method and apparatus for cookie validation and scoring | |
| Ranchal et al. | Protection of identity information in cloud computing without trusted third party | |
| Fischer-Hbner et al. | Privacy-enhancing technologies | |
| Murdoch | Quantifying and measuring anonymity | |
| Bodriagov et al. | Encryption for peer-to-peer social networks | |
| Rebollo‐Monedero et al. | Reconciling privacy and efficient utility management in smart cities | |
| Sharma et al. | A hybrid cryptographic technique for file storage mechanism over cloud | |
| Patel et al. | Homomorphic cryptography and its applications in various domains | |
| Praveena et al. | Prevention of inference attacks for private information in social networking sites | |
| Al-Khafaji et al. | Secure android IoT mobile and collaborative machine learning for controlling the management of enterprise | |
| Chen et al. | PrivBCS: a privacy-preserving and efficient crowdsourcing system with fine-grained worker selection based on blockchain | |
| Arvind et al. | Secure data classification using superior naive classifier in agent based mobile cloud computing | |
| Anusuya et al. | Maximum decision support regression-based advance secure data encrypt transmission for healthcare data sharing in the cloud computing | |
| Singh et al. | Privacy attack modeling and risk assessment method for name data networking | |
| Singh et al. | Threat identification and risk assessments for named data networking architecture using SecRam | |
| Satyanarayana Murty et al. | A hybrid intelligent cryptography algorithm for distributed big data storage in cloud computing security | |
| Trujillo et al. | A traffic analysis attack to compute social network measures | |
| Chen et al. | Ppapafl: a novel approach to privacy protection and anti-poisoning attacks in federated learning | |
| Kapil et al. | Managing multimedia big data: Security and privacy perspective | |
| Preneel et al. | Privacy and security in an age of surveillance (Dagstuhl perspectives workshop 14401) | |
| Cremonini et al. | Privacy on the Internet | |
| Kavianpour et al. | Classification of third-party applications on Facebook to mitigate users’ information leakage | |
| KVK et al. | A novel deep learning technique with cryptographic transformation for enhancing data security in cloud environments |