Quantifying interdependent risks in genomic privacy Read more about Quantifying interdependent risks in genomic privacy
Profile matching across unstructured online social networks: threats and countermeasures Read more about Profile matching across unstructured online social networks: threats and countermeasures
Privacy-preserving aggregate queries for optimal location selection Read more about Privacy-preserving aggregate queries for optimal location selection
Inference attacks against kin genomic privacy Read more about Inference attacks against kin genomic privacy
Cryptographic solutions for credibility and liability issues of genomic data Read more about Cryptographic solutions for credibility and liability issues of genomic data
Collusion-Secure Watermarking for Sequential Data Read more about Collusion-Secure Watermarking for Sequential Data
An inference attack on genomic data using kinship, complex correlations, and phenotype information Read more about An inference attack on genomic data using kinship, complex correlations, and phenotype information
A survey on information security threats and solutions for Machine to Machine (M2M) communications Read more about A survey on information security threats and solutions for Machine to Machine (M2M) communications
When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data Read more about When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data