• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Taiello R, Önen M, Capano F, Humbert O, Lorenzi M. Privacy preserving image registration. Med Image Anal 2024;94:103129. [PMID: 38471338 DOI: 10.1016/j.media.2024.103129] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/23/2023] [Revised: 02/26/2024] [Accepted: 02/27/2024] [Indexed: 03/14/2024]
2
Van Rompay C, Molva R, Önen M. A Leakage-Abuse Attack Against Multi-User Searchable Encryption. Proceedings on Privacy Enhancing Technologies 2017. [DOI: 10.1515/popets-2017-0034] [Citation(s) in RCA: 19] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
3
Leontiadis I, Elkhiyaoui K, Önen M, Molva R. PUDA – Privacy and Unforgeability for Data Aggregation. Cryptology and Network Security 2015. [DOI: 10.1007/978-3-319-26823-1_1] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/07/2023]
4
Shikfa A, Önen M, Molva R. Local key management in opportunistic networks. IJCNDS 2012. [DOI: 10.1504/ijcnds.2012.047898] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA