Author:
Pedrosa Micael,Zúquete André,Costa Carlos
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference67 articles.
1. Kermi A, Marniche-Kermi S, Laskri MT (2010) 3D-computerized facial reconstructions from 3d-mri of human heads using deformable model approach. In: 2010 International Conference on Machine and Web Intelligence (ICMWI). IEEE, pp 276–282
2. Silva JM, Pinho E, Monteiro E, Silva JF, Costa C (2018) Controlled searching in reversibly de-identified medical imaging archives. J Biomed Inform 77:81–90
3. Sweeney L, Abu A, Winn J (2013) Identifying participants in the personal genome project by name (a re-identification experiment). arXiv:https://arxiv.org/abs/1304.7605
4. Narayanan A, Shmatikov V (2008) Robust de-anonymization of large sparse datasets. In: 2008 IEEE Symposium on Security and Privacy (SP). IEEE, pp 111–125
5. Han W, Li Z, Ni M, Gu G, Xu W (2018) Shadow attacks based on password reuses: a quantitative empirical analysis. IEEE Trans Dependable Secure Comput 15(2):309–320
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献