Author of the publication

SWWS 2006 PC Co-chairs' Message.

, , , , and . OTM Workshops (2), volume 4278 of Lecture Notes in Computer Science, page 1723. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spam attacks: p2p to the rescue., , , , , and . WWW (Alternate Track Papers & Posters), page 358-359. ACM, (2004)Efficient SOAP message exchange and evaluation through XML similarity., and . SWS, page 29-36. ACM, (2008)Toward WS-certificate., and . SWS, page 1-2. ACM, (2009)A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test., , and . CAiSE Workshops, volume 148 of Lecture Notes in Business Information Processing, page 466-477. Springer, (2013)Designing of a type-2 fuzzy logic filter for improving edge-preserving restoration of interlaced-to-progressive conversion., , , , and . Inf. Sci., 179 (13): 2194-2207 (2009)Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey., , and . IEEE Access, (2020)Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems., , , , and . J. Assoc. Inf. Sci. Technol., 57 (4): 528-537 (2006)Robotized Counselor Evaluation using Linguistic Detection of Feeling Polarity Change., , , , , , and . SSCI, page 962-967. IEEE, (2019)A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification., , , and . IEEE Trans. Serv. Comput., 13 (1): 30-43 (2020)Controlling Access to XML Documents., , , and . IEEE Internet Comput., 5 (6): 18-28 (2001)