Author of the publication

A distributed privacy-preserving scheme for location-based queries.

, , , and . WOWMOM, page 1-6. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Magkos, Emmanouil
add a person with the name Magkos, Emmanouil
 

Other publications of authors with the same name

Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems., and . WEBIST (1), page 301-304. INSTICC Press, (2008)Toward early warning against Internet worms based on critical-sized networks., , , and . Security and Communication Networks, 6 (1): 78-88 (2013)An Equitably Fair On-line Auction Scheme., , and . EC-Web, volume 1875 of Lecture Notes in Computer Science, page 72-83. Springer, (2000)Uncoercible e-Bidding Games., , and . Electron. Commer. Res., 4 (1-2): 113-125 (2004)Modeling security in cyber-physical systems., , and . IJCIP, 5 (3-4): 118-126 (2012)Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey.. IJITSA, 4 (2): 48-69 (2011)A Model for Hybrid Evidence Investigation., , and . WDFIA, page 119-128. Plymouth University, UK, (2012)Receipt-Freeness in Large-Scale Elections without Untappable Channels., , and . I3E, volume 202 of IFIP Conference Proceedings, page 683-693. Kluwer, (2001)Strong Forward Security., , , and . SEC, volume 193 of IFIP Conference Proceedings, page 109-122. Kluwer, (2001)Lightweight private proximity testing for geospatial social networks., , , and . Computer Communications, (2016)