Daisuke Mashima, Ph.D.
Affiliations: | 2012 | Computer Science | Georgia Institute of Technology, Atlanta, GA |
Area:
Computer ScienceGoogle:
"Daisuke Mashima"Parents
Sign in to add mentorMustaque Ahamad | grad student | 2012 | Georgia Tech | |
(Safeguarding health data with enhanced accountability and patient awareness.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Mashima D, Gunathilaka P, Chen B. (2019) Artificial Command Delaying for Secure Substation Remote Control: Design and Implementation Ieee Transactions On Smart Grid. 10: 471-482 |
Mashima D, Serikova A, Cheng Y, et al. (2018) Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing Ict Express. 4: 35-41 |
Mashima D. (2016) Authenticated down-sampling for privacy-preserving energy usage data sharing 2015 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2015. 605-610 |
Mashima D, Roy A. (2015) Privacy preserving disclosure of authenticated energy usage data 2014 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2014. 866-871 |
Herberg U, Mashima D, Jetcheva JG, et al. (2015) OpenADR 2.0 deployment architectures: Options and implications 2014 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2014. 782-787 |
Lahoti G, Mashima D, Chen WP. (2013) Customer-centric energy usage data management and sharing in smart grid systems Proceedings of the Acm Conference On Computer and Communications Security. 53-64 |
Mashima D, Ahamad M. (2012) Enhancing accountability of Electronic Health Record usage via patient-centric monitoring Ihi'12 - Proceedings of the 2nd Acm Sighit International Health Informatics Symposium. 409-418 |
Mashima D, Bauer D, Ahamad M, et al. (2011) User-centric identity management architecture using credential-holding identity agents Digital Identity and Access Management: Technologies and Frameworks. 78-96 |
Mashima D, Sarkar P, Shi E, et al. (2011) Privacy settings from contextual attributes: A case study using Google Buzz 2011 Ieee International Conference On Pervasive Computing and Communications Workshops, Percom Workshops 2011. 257-262 |
Mashima D, Ahamad M. (2009) Using identity credential usage logs to detect anomalous service accesses Proceedings of the Acm Conference On Computer and Communications Security. 73-79 |