Home > Research > Browse

Results for Data privacy

Publications & Outputs

  1. Using saturated models for data synthesis

    Jackson, J., Francis, B., Mitra, R. & Dove, I., 18/07/2022, Proceedings of the 36th International Workshop on Statistical Modelling: July 18-22, 2022 - Trieste, Italy. Torelli, N., Bellio, R. & Muggeo, V. (eds.). EUT Edizioni Università di Trieste, Trieste 2022, p. 205-210 6 p. 34

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  2. On the Design of Federated Learning in Latency and Energy Constrained Computation Offloading Operations in Vehicular Edge Computing Systems

    Shinde, S. S., Bozorgchenani, A., Tarchi, D. & Ni, Q., 28/02/2022, In: IEEE Transactions on Vehicular Technology. 71, 2, p. 2041-2057 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Pavan: A privacy-preserving system for DB-as-a-Service

    Sobati Moghadam, S., Fayoumi, A. & Vafadoost, P., 27/11/2020, (E-pub ahead of print) In: ICT Express.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data

    Qi, L., Zhang, X., Dou, W. & Ni, Q., 11/2017, In: IEEE Journal on Selected Areas in Communications. 35, 11, p. 2616-2624 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. SENTRY: A novel approach for mitigating application layer DDoS threats

    Zhang, H., Taha, A., Trapero, R., Luna, J. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 465-472 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Trust validation of cloud IaaS: A customer-centric approach

    Manzoor, S., Taha, A. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 97-104 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Quantifiably Trusting the Cloud: Putting Metrics to Work

    Trapero, R., Luna, J. & Suri, N., 1/06/2016, In: IEEE Security and Privacy Magazine. 14, 3, p. 73-77 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Assessing privacy capabilities of cloud service providers

    Del Alamo, J. M., Trapero, R., Martin, Y. S., Yelmo, J. C. & Suri, N., 1/11/2015, In: IEEE Latin America Transactions. 13, 11, p. 3634-3641 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Sustaining Computer's impact and adapting to change

    Helal, S., 2015, In: Computer. 48, 1, p. 7-9 3 p.

    Research output: Contribution to Journal/MagazineEditorial

  11. Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

More results »