Author of the publication

Combining Usability and Privacy Protection in Free-Access Public Cloud Storage Servers: Review of the Main Threats and Challenges.

, , and . CoRR, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multimodale Bildregistrierung von fpVCT- und OCT-Daten zur Realisierung hochgenauer medizinischer Navigation., , , , , and . CURAC, volume 1475 of CEUR Workshop Proceedings, page 165-168. Der Andere Verlag, Düsseldorf, (2010)Towards Intra-operative OCT Guidance for Automatic Head Surgery: First Experimental Results., , , , and . MICCAI (3), volume 8151 of Lecture Notes in Computer Science, page 347-354. Springer, (2013)Korrektur geometrischer Verzeichnungen zur Kalibrierung von optischen Kohärenztomographiesystemen., , , , , , and . Bildverarbeitung für die Medizin, page 233-238. Springer, (2015)Normal distributions transform in multi-modal image registration of optical coherence tomography and computed tomography datasets., , , and . Medical Imaging: Image Processing, volume 9034 of SPIE Proceedings, page 90343L. SPIE, (2014)Localization accuracy of sphere fiducials in computed tomography images., , , , , and . Medical Imaging: Image-Guided Procedures, volume 9036 of SPIE Proceedings, page 90360Z. SPIE, (2014)On securing online registration protocols: Formal verification of a new proposal., , and . Knowl. Based Syst., (2014)Cryptanalysis of a one round chaos-based Substitution Permutation Network., , and . Signal Process., 93 (5): 1358-1364 (2013)Hyot: Leveraging Hyperledger for Constructing an Event-Based Traceability System in IoT., , and . CISIS-ICEUTE, volume 951 of Advances in Intelligent Systems and Computing, page 195-204. Springer, (2019)Cryptanalysis of a one round chaos-based Substitution Permutation Network, , and . CoRR, (2012)Formal security analysis of registration protocols for interactive systems: a methodology and a case of study, , and . CoRR, (2012)