default search action
Anne V. D. M. Kayem
Person information
- affiliation: Hasso-Plattner-Institute, Potsdam, Germany
- affiliation (former): Queen's University, Canada
- affiliation (former): University of Cape Town, South Africa
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c48]Md Hasan Shahriar, Abrar Hasin Kamal, Anne V. D. M. Kayem:
Discovering Personally Identifiable Information in Textual Data - A Case Study with Automated Concatenation of Embeddings. AINA (4) 2024: 145-158 - [c47]Md Hasan Shahriar, Anne V. D. M. Kayem, David Reich, Christoph Meinel:
Identifying Personal Identifiable Information (PII) in Unstructured Text: A Comparative Study on Transformers. DEXA (2) 2024: 174-181 - 2023
- [c46]Md. Rakibul Islam, Anne V. D. M. Kayem, Christoph Meinel:
Enabling PII Discovery in Textual Data via Outlier Detection. DEXA (2) 2023: 209-216 - 2022
- [c45]Farzad Nourmohammadzadeh Motlagh, Anne V. D. M. Kayem, Christoph Meinel:
A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media. AINA (1) 2022: 140-151 - [c44]Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel:
CoK: A Survey of Privacy Challenges in Relation to Data Meshes. DEXA (1) 2022: 85-102 - 2021
- [j5]Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel:
A Parallel Quasi-identifier Discovery Scheme for Dependable Data Anonymisation. Trans. Large Scale Data Knowl. Centered Syst. 50: 1-24 (2021) - [c43]Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel:
A Review of Scaling Genome Sequencing Data Anonymisation. AINA (3) 2021: 491-501 - [c42]Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel:
GPU Accelerated Bayesian Inference for Quasi-Identifier Discovery in High-Dimensional Data. AINA (2) 2021: 495-508 - [c41]Farzad Nourmohammadzadeh Motlagh, Anne Kayem, Nikolai Jannik Podlesny, Christoph Meinel:
Enabling Co-owned Image Privacy on Social Media via Agent Negotiation. iiWAS 2021: 152-156 - [c40]Anne V. D. M. Kayem, Nikolai J. Podlesny, Christoph Meinel:
On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service. SECRYPT 2021: 704-714
2010 – 2019
- 2019
- [c39]Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel:
Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization. CODASPY 2019: 109-119 - [c38]Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel:
Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold. DASC/PiCom/DataCom/CyberSciTech 2019: 556-563 - [c37]Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel:
Towards Identifying De-anonymisation Risks in Distributed Health Data Silos. DEXA (1) 2019: 33-43 - [c36]Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel, Sven Jungmann:
How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect. PDH 2019: 55-62 - 2018
- [j4]Anne V. D. M. Kayem, C. T. Vester, Christoph Meinel:
Syntactic Anonymisation of Shared Datasets in Resource Constrained Environments. Trans. Large Scale Data Knowl. Centered Syst. 38: 27-60 (2018) - [c35]Pacome Landry Ambassa, Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel:
Privacy Risks in Resource Constrained Smart Micro-Grids. AINA Workshops 2018: 527-532 - [c34]Kennedy A. Torkura, Muhammad I. H. Sukmana, Michael Meinig, Anne V. D. M. Kayem, Feng Cheng, Hendrik Graupner, Christoph Meinel:
Securing Cloud Storage Brokerage Systems Through Threat Models. AINA 2018: 759-768 - [c33]Nikolai J. Podlesny, Anne V. D. M. Kayem, Stephan von Schorlemer, Matthias Uflacker:
Minimising Information Loss on Anonymised High Dimensional Data with Greedy In-Memory Processing. DEXA (1) 2018: 85-100 - [c32]Kennedy A. Torkura, Muhammad I. H. Sukmana, Anne V. D. M. Kayem:
A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 932-939 - [p4]Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel:
Power Systems: A Matter of Security and Privacy. Smart Micro-Grid Systems Security and Privacy 2018: 1-8 - [p3]Anne V. D. M. Kayem, Christoph Meinel, Stephen D. Wolthusen:
A Resilient Smart Micro-Grid Architecture for Resource Constrained Environments. Smart Micro-Grid Systems Security and Privacy 2018: 71-101 - [p2]Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen:
The Design and Classification of Cheating Attacks on Power Marketing Schemes in Resource Constrained Smart Micro-Grids. Smart Micro-Grid Systems Security and Privacy 2018: 103-144 - [p1]Pacome L. Ambassa, Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel:
Inferring Private User Behaviour Based on Information Leakage. Smart Micro-Grid Systems Security and Privacy 2018: 145-159 - [e1]Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel:
Smart Micro-Grid Systems Security and Privacy. Advances in Information Security 71, Springer 2018, ISBN 978-3-319-91426-8 [contents] - 2017
- [c31]Anne V. D. M. Kayem, Christoph Meinel, Stephen D. Wolthusen:
A Smart Micro-Grid Architecture for Resource Constrained Environments. AINA 2017: 857-864 - [c30]Anne V. D. M. Kayem, Christoph Meinel:
Clustering Heuristics for Efficient t-closeness Anonymisation. DEXA (2) 2017: 27-34 - [c29]Aderonke Busayo Sakpere, Anne V. D. M. Kayem:
On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments. Privacy and Identity Management 2017: 170-186 - 2016
- [c28]Anne V. D. M. Kayem, Heinrich Strauss, Stephen D. Wolthusen, Christoph Meinel:
Key Management for Secure Demand Data Communication in Constrained Micro-Grids. AINA Workshops 2016: 585-590 - [c27]Anne V. D. M. Kayem:
Graphical Passwords - A Discussion. AINA Workshops 2016: 596-600 - [c26]Pacome L. Ambassa, Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel:
Privacy Violations in Constrained Micro-Grids: Adversarial Cases. AINA Workshops 2016: 601-606 - [c25]Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen:
Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating. CRITIS 2016: 137-149 - [c24]Heinrich Strauss, Anne V. D. M. Kayem, Stephen D. Wolthusen:
Reliable Key Distribution in Smart Micro-Grids. CRITIS 2016: 265-270 - [c23]Anne V. D. M. Kayem, C. T. Vester, Christoph Meinel:
Automated k-Anonymization and l-Diversity for Shared Data Privacy. DEXA (1) 2016: 105-120 - [c22]Pacome L. Ambassa, Stephen D. Wolthusen, Anne V. D. M. Kayem, Christoph Meinel:
Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids. CyberICPS@ESORICS 2016: 52-68 - [c21]Goitom K. Weldehawaryat, Pacome L. Ambassa, Anesu M. C. Marufu, Stephen D. Wolthusen, Anne V. D. M. Kayem:
Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security. CyberICPS@ESORICS 2016: 69-86 - [c20]Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen:
Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids. HPCC/SmartCity/DSS 2016: 1380-1387 - [c19]Ammar Abuelgasim, Anne V. D. M. Kayem:
A Snow-Ball Algorithm for Automating Privacy Policy Configuration in Social Media. ICISSP (Revised Selected Papers) 2016: 108-129 - [c18]Ammar Abuelgasim, Anne Kayem:
An Approach to Personalized Privacy Policy Recommendations on Online Social Networks. ICISSP 2016: 126-137 - [c17]Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen:
Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. ICISSP 2016: 448-456 - 2015
- [c16]Richard Ssembatya, Anne V. D. M. Kayem:
Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments. AINA Workshops 2015: 411-416 - [c15]Aderonke Busayo Sakpere, Anne V. D. M. Kayem, Thabo Ndlovu:
A Usable and Secure Crime Reporting System for Technology Resource Constrained Context. AINA Workshops 2015: 424-429 - [c14]Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen:
A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids. CRITIS 2015: 183-196 - [c13]Pacome L. Ambassa, Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel:
Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids. FNSS 2015: 166-180 - [c12]Aderonke Busayo Sakpere, Anne V. D. M. Kayem:
Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences. ICISSP (Revised Selected Papers) 2015: 122-136 - [c11]Aderonke Busayo Sakpere, Anne V. D. M. Kayem:
Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss. ICISSP 2015: 191-201 - [c10]Pacome L. Ambassa, Stephen D. Wolthusen, Anne V. D. M. Kayem, Christoph Meinel:
Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids. ISGT Asia 2015: 1-6 - 2014
- [c9]Mark-John Burke, Anne V. D. M. Kayem:
K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments. AINA Workshops 2014: 833-840 - [c8]Anne V. D. M. Kayem, Khalid Elgazzar, Patrick Martin:
Secure and Efficient Data Placement in Mobile Healthcare Services. DEXA (1) 2014: 352-361 - 2013
- [j3]Andrew Adamatzky, Selim G. Akl, Ramón Alonso-Sanz, Wesley van Dessel, Zuwairie Ibrahim, Andrew Ilachinski, Jeff Jones, Anne V. D. M. Kayem, Genaro Juárez Martínez, Pedro Paulo Balbi de Oliveira, Mikhail Prokopenko, Theresa Schubert, Peter M. A. Sloot, Emanuele Strano, Xin-She Yang:
Are motorways rational from slime mould's point of view? Int. J. Parallel Emergent Distributed Syst. 28(3): 230-248 (2013) - [c7]Richard Ssembatya, Anne V. D. M. Kayem, Gary Marsden:
On the challenge of adopting standard EHR systems in developing countries. ACM DEV (3) 2013: 23:1-23:2 - 2012
- [c6]Anne V. D. M. Kayem, Azhar Deshai, Stuart Hammer:
On anonymizing social network graphs. ISSA 2012: 1-8 - [i1]Andrew Adamatzky, Selim G. Akl, Ramón Alonso-Sanz, Wesley van Dessel, Zuwairie Ibrahim, Andrew Ilachinski, Jeff Jones, Anne V. D. M. Kayem, Genaro Juárez Martínez, Pedro Paulo Balbi de Oliveira, Mikhail Prokopenko, Theresa Schubert, Peter M. A. Sloot, Emanuele Strano, Xin-She Yang:
Are motorways rational from slime mould's point of view? CoRR abs/1203.2851 (2012) - 2011
- [j2]Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl:
Enhancing identity trust in cryptographic key management systems for dynamic environments. Secur. Commun. Networks 4(1): 79-94 (2011) - [c5]Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl:
Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data. ISSA 2011 - 2010
- [b1]Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin:
Adaptive Cryptographic Access Control. Advances in Information Security 48, Springer 2010, ISBN 978-0-387-77265-3, pp. 1-135 - [c4]Anne Kayem:
On Monitoring Information Flow of Outsourced Data. ISSA 2010
2000 – 2009
- 2008
- [j1]Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin:
On replacing cryptographic keys in hierarchical key management systems. J. Comput. Secur. 16(3): 289-309 (2008) - [c3]Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl, Wendy Powley:
A Framework for Self-Protecting Cryptographic Key Management. SASO 2008: 191-200 - 2007
- [c2]Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl:
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy. AINA Workshops (1) 2007: 531-536 - 2005
- [c1]Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin:
An Independent Set Approach to Solving the Collaborative Attack Problem. IASTED PDCS 2005: 594-599
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint