The chapter 'A data utility-driven benchmark for de-identi¿cation methods' is open access under a...
This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Wo...
The 15 revised full papers presented were carefully selected from 27 submissions. The papers are ...
This book constitutes the refereed proceedings of the 5th European Public Key Infrastructure Work...
This book presents the proceedings of the 7th International Conference on Trust, P- vacy and Secu...
The 6 revised full papers and 2 short papers of CyberICS 2015 presented together with 3 revised f...
This book constitutes the refereed proceedings of the 8th International Conference on Trust and P...
This book constitutes the thoroughly refereed post-conference proceedings of the 4th Internationa...
This book constitutes the refereed proceedings of the 5th International Conference on Trust and P...
This book constitutes the proceedings of the 14th International Workshop on Security and Trust Ma...
This book constitutes the refereed proceedings of the 13th International Conference on Trust, Pri...
This book constitutes the refereed proceedings of the 9th International Conference on Information...