Sourya Joyee De
Orcid: 0000-0002-1138-0315
According to our database1,
Sourya Joyee De
authored at least 23 papers
between 2013 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Elucidating the role of emotion in privacy-concerns: A text-Convolutional Neural Network (Text-CNN)-based tweets analysis of contact tracing apps: Elucidating the role of emotion in privacy-concerns.
Australas. J. Inf. Syst., 2022
2020
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02355-2, 2020
IEEE Trans. Cloud Comput., 2020
2018
To reveal or not to reveal: balancing user-centric social benefit and privacy in online social networks.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018
On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper).
Proceedings of the Risks and Security of Internet and Systems, 2018
2017
Proceedings of the Risks and Security of Internet and Systems, 2017
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017
2016
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02349-1, 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the Data Privacy Management and Security Assurance, 2016
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
Proceedings of the 32nd ACM International Conference on The Design of Communication, 2014
A Policy-Based Security Framework for Storage and Computation on Enterprise Data in the Cloud.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-silent Players.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Achieving Energy Efficiency and Security in Mobile Cloud Computing.
Proceedings of the CLOSER 2013, 2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013