Sourya Joyee De

Orcid: 0000-0002-1138-0315

According to our database1, Sourya Joyee De authored at least 23 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Elucidating the role of emotion in privacy-concerns: A text-Convolutional Neural Network (Text-CNN)-based tweets analysis of contact tracing apps: Elucidating the role of emotion in privacy-concerns.
Australas. J. Inf. Syst., 2022

2020
Privacy Risk Analysis of Online Social Networks
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02355-2, 2020

Efficient Decentralized Attribute Based Access Control for Mobile Clouds.
IEEE Trans. Cloud Comput., 2020

Consent for targeted advertising: the case of Facebook.
AI Soc., 2020

2018
To reveal or not to reveal: balancing user-centric social benefit and privacy in online social networks.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Enabling Users to Balance Social Benefit and Privacy in Online Social Networks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Privacy Risk Analysis to Enable Informed Privacy Settings.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper).
Proceedings of the Risks and Security of Internet and Systems, 2018

2017
Privacy Scoring of Social Network User Profiles Through Risk Analysis.
Proceedings of the Risks and Security of Internet and Systems, 2017

A Refinement Approach for the Reuse of Privacy Risk Analysis Results.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

2016
Privacy Risk Analysis
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02349-1, 2016

Privacy Harm Analysis: A Case Study on Smart Grids.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

PRIAM: A Privacy Risk Analysis Methodology.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Failure Tolerant Rational Secret Sharing.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
A Proposal for Quantum Rational Secret Sharing.
CoRR, 2015

Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
A Mobile Banking Model in the Cloud for Financial Inclusion in India.
Proceedings of the 32nd ACM International Conference on The Design of Communication, 2014

A Policy-Based Security Framework for Storage and Computation on Enterprise Data in the Cloud.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-silent Players.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Auctions with Rational Adversary.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Achieving Energy Efficiency and Security in Mobile Cloud Computing.
Proceedings of the CLOSER 2013, 2013

Achieving Correctness in Fair Rational Secret Sharing.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

Cloud-Based Privacy Aware Preference Aggregation Service.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013


  Loading...