Author of the publication

No Silver Bullet: Identifying Security Vulnerabilities in Anonymization Protocols for Hospital Databases.

, , , , and . IJHISI, 7 (4): 48-58 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximating Aggregation Queries in Peer-to-Peer Networks., , , and . ICDE, page 42. IEEE Computer Society, (2006)Distributed core assisted scalable data dissemination in mobile ad hoc networks., , , and . CollaborateCom, IEEE Computer Society / ICST, (2005)An expressive framework and efficient algorithms for the analysis of collaborative tagging., , , , and . VLDB J., 23 (2): 201-226 (2014)ASAP: Eliminating algorithm-based disclosure in privacy-preserving data publishing., , and . Inf. Syst., 36 (5): 859-880 (2011)Analyzing the Structure and Evolution of Massive Telecom Graphs., , , , , , , and . IEEE Trans. Knowl. Data Eng., 20 (5): 703-718 (2008)Structure Analytics in Social Media., , , , and . Encyclopedia of Database Systems (2nd ed.), Springer, (2018)On Sparse Spanners of Weighted Graphs., , , , and . Discrete & Computational Geometry, (1993)The Discrete Basis Problem., , , , and . PKDD, volume 4213 of Lecture Notes in Computer Science, page 335-346. Springer, (2006)Finding Similar Time Series., , and . PKDD, volume 1263 of Lecture Notes in Computer Science, page 88-100. Springer, (1997)Constructing Degree-3 Spanners with Other Sparseness Properties., and . Int. J. Found. Comput. Sci., 7 (2): 121-136 (1996)