Hervais Simo Fhom

According to our database1, Hervais Simo Fhom authored at least 17 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Towards Automated Detection and Prevention of Regrettable (Self-) Disclosures on Social Media.
Proceedings of the IEEE International Conference on Trust, 2022

REGRETS: A New Corpus of Regrettable (Self-)Disclosures on Social Media.
Proceedings of the IEEE INFOCOM 2022, 2022

Datenschutz- und Sicherheitsanalyse von Mobilen Learning Apps.
Proceedings of the Selbstbestimmung, 2022

2021
PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Privacy Policies of Mobile Apps - A Usability Study.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Poster: WallGuard - A Deep Learning Approach for Avoiding Regrettable Posts in Social Media.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

2020
Privacy-Preserving IDS for In-Vehicle Networks with Local Differential Privacy.
Proceedings of the Privacy and Identity Management: 15th IFIP WG 9.2, 2020

2019
Decision Support for Mobile App Selection via Automated Privacy Assessment.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

Quotable Signatures using Merkle Trees.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

2017
Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection.
Int. J. Inf. Sec., 2017

2016
Towards Privacy-preserving Mobile Location Analytics.
Proceedings of the Workshops of the EDBT/ICDT 2016 Joint Conference, 2016

2015
Big Data: Opportunities and Privacy Challenges.
CoRR, 2015

2012
Security Policies in Dynamic Service Compositions.
Proceedings of the SECRYPT 2012, 2012

2011
Towards a Holistic Privacy Engineering Approach for Smart Grid Systems.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks.
Proceedings of the Communications: Wireless in Developing Countries and Networks of the Future, 2010

Increasing Security and Privacy in User-centric Identity Management: The IdM Card Approach.
Proceedings of the 3PGCIC 2010, 2010

2009
Final Architecture Specification of security, privacy, and incentive mechanisms
CoRR, 2009


  Loading...