default search action
Klara Stokes
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Signe Lundqvist, Klara Stokes, Lars-Daniel Öhman:
Exploring the rigidity of planar configurations of points and rods. Discret. Appl. Math. 336: 68-82 (2023) - [j14]Klara Stokes:
Cover-up: a probabilistic privacy-preserving graph database model. J. Ambient Intell. Humaniz. Comput. 14(11): 15003-15010 (2023) - 2022
- [j13]A. D. Forbes, Terry S. Griggs, Klara Stokes:
Existence results for pentagonal geometries. Australas. J Comb. 82: 95-114 (2022) - 2020
- [i7]Anthony D. Forbes, Terry S. Griggs, Klara Stokes:
Existence results for pentagonal geometries. CoRR abs/2007.10810 (2020)
2010 – 2019
- 2019
- [j12]Marston D. E. Conder, Klara Stokes:
New methods for finding minimum genus embeddings of graphs on orientable and non-orientable surfaces. Ars Math. Contemp. 17(1): 1-35 (2019) - [p2]Vicenç Torra, Guillermo Navarro-Arribas, Klara Stokes:
Data Privacy. Data Science in Practice 2019: 121-132 - 2016
- [j11]Klara Stokes:
Irreducibility of configurations. Ars Math. Contemp. 10(1): 169-181 (2016) - [j10]Klara Stokes, Milagros Izquierdo:
Geometric point-circle pentagonal geometries from Moore graphs. Ars Math. Contemp. 11(1): 215-229 (2016) - [i6]Klara Stokes:
Geometric decoding of subspace codes with explicit Schubert calculus applied to spread codes. CoRR abs/1610.02022 (2016) - 2015
- [p1]Klara Stokes, Maria Bras-Amorós:
A Survey on the Use of Combinatorial Configurations for Anonymous Database Search. Advanced Research in Data Privacy 2015: 407-419 - 2014
- [j9]Klara Stokes, Oriol Farràs:
Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search notes. Des. Codes Cryptogr. 71(3): 503-524 (2014) - [j8]Klara Stokes, Oriol Farràs:
Erratum to: Linear spaces and transversal designs: $$k$$ -anonymous combinatorial configurations for anonymous database search. Des. Codes Cryptogr. 71(3): 525 (2014) - 2013
- [c8]Klara Stokes:
Graph k-Anonymity through k-Means and as Modular Decomposition. NordSec 2013: 263-278 - [c7]Klara Stokes, Niklas Carlsson:
A peer-to-peer agent community for digital oblivion in online social networks. PST 2013: 103-110 - [i5]Vicenç Torra, Klara Stokes:
A formalization of re-identification in terms of compatible probabilities. CoRR abs/1301.5022 (2013) - 2012
- [j7]Klara Stokes, Vicenç Torra:
Guest Editors' Introduction. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 20(6): 791-792 (2012) - [j6]Klara Stokes, Vicenç Torra:
Multiple Releases of k-Anonymous Data Sets and k-Anonymous Relational Databases. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 20(6): 839-854 (2012) - [j5]Vicenç Torra, Klara Stokes:
A Formalization of Record Linkage and its Application to Data Protection. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 20(6): 907-920 (2012) - [j4]Klara Stokes, Vicenç Torra:
Reidentification and k-anonymity: a model for disclosure risk in graphs. Soft Comput. 16(10): 1657-1670 (2012) - [j3]Vicenç Torra, Klara Stokes, Yasuo Narukawa:
An Extension of Fuzzy Measures to Multisets and Its Relation to Distorted Probabilities. IEEE Trans. Fuzzy Syst. 20(6): 1032-1045 (2012) - [c6]Klara Stokes, Vicenç Torra:
n-confusion: a generalization of k-anonymity. EDBT/ICDT Workshops 2012: 211-215 - [c5]Klara Stokes, Vicenç Torra:
On the relationship between clustering and coding theory. FUZZ-IEEE 2012: 1-6 - [c4]Klara Stokes:
On Computational Anonymity. Privacy in Statistical Databases 2012: 336-347 - [i4]Klara Stokes, Oriol Farràs:
Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search. CoRR abs/1206.5930 (2012) - [i3]Vicenç Torra, Klara Stokes:
Reidentification for Measuring Disclosure Risk. ERCIM News 2012(90) (2012) - 2011
- [b1]Klara Stokes:
Combinatorial structures for anonymous database search. University of Rovira i Virgili, Spain, 2011 - [j2]Klara Stokes, Maria Bras-Amorós:
Associating a numerical semigroup to the triangle-free configurations. Adv. Math. Commun. 5(2): 351-371 (2011) - [c3]Klara Stokes, Maria Bras-Amorós:
On query self-submission in peer-to-peer user-private information retrieval. PAIS 2011: 7 - [c2]Klara Stokes, Vicenç Torra:
On some clustering approaches for graphs. FUZZ-IEEE 2011: 409-415 - [c1]Yasuo Narukawa, Klara Stokes, Vicenç Torra:
Fuzzy Measures and Comonotonicity on Multisets. MDAI 2011: 20-30 - [i2]Klara Stokes, Vicenç Torra:
Reidentification and k-anonymity: a model for disclosure risk in graphs. CoRR abs/1112.1978 (2011) - 2010
- [j1]Klara Stokes, Maria Bras-Amorós:
Optimal configurations for peer-to-peer user-private information retrieval. Comput. Math. Appl. 59(4): 1568-1577 (2010)
2000 – 2009
- 2009
- [i1]Maria Bras-Amorós, Klara Stokes:
The semigroup of combinatorial configurations. CoRR abs/0907.4230 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint