The chapter 'A data utility-driven benchmark for de-identi¿cation methods' is open access under a...
This book constitutes the thoroughly refereed post-conference proceedings of the 4th Internationa...
This book constitutes the refereed proceedings of the 9th International Conference on Information...
This book constitutes the thoroughly refereed post-conference proceedings of the Third Internatio...
While traveling the data highway through the global village, most people, if they think about it ...
The CyberICPS Workshop received 13 submissions from which 5 full papers and 2 short papers were s...
This book constitutes the refereed proceedings of the 17th International Conference on Trust, Pri...
This book constitutes the refereed post-conference proceedings of the 6th International Workshop ...
This book constitutes the refereed proceedings of the First European Public Key Infrastructure Wo...
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven Inte...
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven I...