Gabor Gyorgy Gulyas
Gabor Gyorgy Gulyas
not affiliated
E-mail megerősítve itt: crysys.hu - Kezdőlap
CímIdézteÉv
User tracking on the web via cross-browser fingerprinting
K Boda, ÁM Földes, GG Gulyás, S Imre
Nordic Conference on Secure IT Systems, 31-46, 2011
1092011
Comprehensive analysis of web privacy and anonymous web browsers: are next generation services based on collaborative filtering?
G Gulyás, R Schulcz, S Imre
Joint SPACE and TIME International Workshops, 2008
152008
Measuring importance of seeding for structural de-anonymization attacks in social networks
GG Gulyas, S Imre
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 …, 2014
122014
Hiding information in social networks from de-anonymization attacks by using identity separation
GG Gulyás, S Imre
IFIP International Conference on Communications and Multimedia Security, 173-184, 2013
102013
Modeling role-based privacy in social networking services
GG Gulyás, R Schulcz, S Imre
Emerging Security Information, Systems and Technologies, 2009. SECURWARE'09 …, 2009
92009
Near-optimal fingerprinting with constraints
GG Gulyás, G Acs, C Castelluccia
Proceedings on Privacy Enhancing Technologies 2016 (4), 470-487, 2016
82016
Using Identity Separation Against De-anonymization of Social Networks.
GG Gulyás, S Imre
Trans. Data Privacy 8 (2), 113-140, 2015
82015
Analysis of Identity Separation Against a Passive Clique-Based De-anonymization Attack
GG Gulyás, S Imre
Infocommunications Journal 3 (4), 11, 2011
82011
StegoWeb: Towards the ideal private web content publishing tool
T Besenyei, ÁM Földes, GG Gulyás, S Imre
Proceedings of the fifth international conference on emerging security …, 2011
82011
Analysis of grasshopper, a novel social network de-anonymization algorithm
B Simon, GG Gulyás, S Imre
Periodica Polytechnica Electrical Engineering and Computer Science 58 (4 …, 2014
72014
Measuring local topological anonymity in social networks
GG Gulyas, S Imre
2012 IEEE 12th International Conference on Data Mining Workshops, 563-570, 2012
72012
BlogCrypt: Private Content Publishing on the Web
T Paulik, AM Foldes, GG Gulyas
Emerging Security Information Systems and Technologies (SECURWARE), 2010 …, 2010
62010
An Efficient and Robust Social Network De-anonymization Attack
GG Gulyás, B Simon, S Imre
Workshop on Privacy in the Electronic Society 2016, 2016
22016
Protecting privacy against structural de-anonymization attaks in social networks
GG Gulyás
Budapesti Műszaki és Gazdaságtudományi Egyetem, 2015
12015
Tracking and Fingerprinting in E-Business: New Storageless Technologies and Countermeasures
K Boda, ÁM Földes, GG Gulyás, S Imre
Research and Development in E-Business through Service-Oriented Solutions …, 2013
12013
Separating Private and Business Identities
GG Gulyás, R Schulcz, S Imre
Digital Identity and Access Management: Technologies and Frameworks, 114-132, 2012
12012
To Extend or not to Extend: on the Uniqueness of Browser Extensions and Web Logins
GG Gulyas, DF Some, N Bielova, C Castelluccia
WPES 2018, 2018
2018
Hiding Information Against Structural Re-identification
GG Gulyás, S Imre
Accepted for publication in the International Journal of Information Security, 2018
2018
Using machine learning techniques for de- anonymization
GG Gulyás
Információs Társadalom 17 (1), 72-86, 2017
2017
Privátszféra-barát identitásmenedzsment alkalmazása anonim böngészőkben
S Dargó, GG Gulyás
http://pet-portal.eu/files/articles/2010/dargo_gulyas_pidm.pdf, 2010
2010
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20