SB
Publications
- Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons
- ICMS: A Flexible Location-Based Access Control System for Mobile Devices
- Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
- The Role of AI, Machine Learning, and Big Data in Digital Twinning: A Systematic Literature Review, Challenges, and Opportunities
- Continuous monitoring of top-k queries over sliding windows
- Retrieval of spatial join pattern instances from sensor networks
- Leveraging P2P interactions for efficient location privacy in database-driven dynamic spectrum access
- Efficient location privacy for moving clients in database-driven dynamic spectrum access
- On discovering moving clusters in spatio-temporal data
- Evaluation of top-k OLAP queries using aggregate R-trees
- Constrained shortest path computation
- Real datasets for file-sharing peer-to-peer systems
- Approximate server selection algorithms in Content Distribution Networks
- Efficient resource management for end-to-end QoS guarantees in DiffServ networks
- An anonymous messaging system for Delay Tolerant Networks
- Vertical dimensioning: A novel DRR implementation for efficient fair queueing
- Ad-hoc distributed spatial joins on mobile devices
- Privacy-Preserving Blockchain-Based Energy Trading Schemes for Electric Vehicles
- SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol
- Leveraging P2P interactions for efficient location privacy in database-driven dynamic spectrum access
- Optimization of spatial joins on mobile devices
- Verifying spatial queries using voronoi neighbors
- Increasing the performance of CDNs using replication and caching: A hybrid approach
- Adaptive schemes for distributed web caching
- Continuous monitoring of spatial queries in wireless broadcast environments
- Retrieval of spatial join pattern instances from sensor networks
- Maximizing the number of users in an interactive video-on-demand system
- Combining replica placement and caching techniques in content distribution networks
- Continuous spatial authentication
- PCloud: A distributed system for practical PIR
- A scalable architecture for end-to-end QoS provisioning
- A general framework for searching in distributed data repositories
- Private proximity detection for convex polygons
- DCMP: A distributed cycle minimization protocol for peer-to-peer networks
- Optimizing privacy-preserving DSA for mobile clients
- Dynamic organization schemes for cooperative proxy caching
- Adjusting the trade-off between privacy guarantees and computational cost in secure hardware PIR
- Privacy-preserving ranked search on public-key encrypted data
- Spatial query integrity with voronoi neighbors
- A threshold-based algorithm for continuous monitoring of k nearest neighbors
- Privacy-preserving location-aware mobile advertisement
- Nearest neighbor search with strong location privacy
- Secure similar document detection with simhash
- Tracking moving objects in anonymized trajectories
- Private proximity detection for convex polygons
- FN2: Fake News DetectioN Based on Textual and Contextual Features
- Secure and Anonymous Communications Over Delay Tolerant Networks
- Multilevel Graph-Based Decision Making in Big Scholarly Data: An Approach to Identify Expert Reviewer, Finding Quality Impact Factor, Ranking Journals and Researchers
- Privacy-Preserving Multipoint Traffic Flow Estimation for Road Networks
- Towards real-time privacy-preserving video surveillance
- Quality of service support in differentiated services packet networks
- Smoothing and prefetching video from distributed servers
- Anonymous Communications over Delay Tolerant Networks
- Top-k OLAP Queries Using Augmented Spatial Access Methods
- Approximate server selection algorithms in content distribution networks
- Top-k OLAP Queries Using Augmented Spatial Access Methods
- Privacy-Preserving Traffic Flow Estimation for Road Networks
- Top-k OLAP Queries Using Augmented Spatial Access Methods
- UBIC-A Blockchain-Less Cryptocurrency
- HITC
- Securing Blockchain-Based Supply Chain Workflow against Internal and External Attacks
- Data Privacy in Online Social Networks With FineGrained Access Control
- Density-based Community Detection in Geo-Social Networks
- Security of Blockchain-Based Supply Chain Management Systems: Challenges and Opportunities
- Smart Home Security: A Distributed Identity-Based Security Protocol for Authentication and Key Exchange
- Privacy-Preserving Electric Vehicle Charging for Peer-to-Peer Energy Trading Ecosystems
- Constrained Shortest Path Computation
- IoTrace: A Flexible, Efficient, and Privacy-Preserving IoT-Enabled Architecture for Contact Tracing
- A Practical System for Privacy-Preserving Video Surveillance
- IoTrace: A flexible, efficient, and privacy-preserving IoT-enabled architecture for contact tracing
- Distributed Real-Time Data Aggregation Scheduling in Duty-Cycled Multi-hop Sensor Networks
- Design and Implementation of Certificateless Cryptography for IoT Applications
- FN2: Fake News DetectioN Based on Textual and Contextual Features
- A Survey on Post-Quantum Cryptography for 5G/6G Communications
- Multimodal Face Data Sets—A Survey of Technologies, Applications, and Contents
- Towards a Scalable and Privacy-Preserving Audio Surveillance System
- Secure Biometric Verification in the Presence of Malicious Adversaries
Usage metrics
Co-workers & collaborators
- RD
Roberto Di Pietro
- JS
Jens Schneider
- EB
Elmahdi Bentafat
- BW
Bo Wang
- HG
Huaqun Guo
- JS
James She