Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Architecture Evaluation through Ontology-Based Requirements-Level Scenarios., , , , and . WADS, volume 5135 of Lecture Notes in Computer Science, page 225-247. Springer, (2007)Indexing Encrypted Documents for Supporting Efficient Keyword Search., , , and . Secure Data Management, volume 7482 of Lecture Notes in Computer Science, page 93-110. Springer, (2012)Nomad: A Framework for Developing Mission-Critical Cloud-Based Applications., , , , , and . ARES, page 660-669. IEEE Computer Society, (2015)A Forensic Pattern-Based Approach for Investigations in Cloud System Environments., and . CSNet, page 1-8. IEEE, (2018)CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework., , , , , and . Financial Cryptography Workshops, volume 9604 of Lecture Notes in Computer Science, page 319-327. Springer, (2016)IoT Notary: Attestable Sensor Data Capture in IoT Environments., , , , , , and . CoRR, (2021)A privacy-enabled platform for COVID-19 applications: poster abstract., , , , , , , , , and 5 other author(s). SenSys, page 745-746. ACM, (2020)CloudProtect: Managing Data Privacy in Cloud Applications., , , , and . IEEE CLOUD, page 303-310. IEEE Computer Society, (2012)IoT Notary: Sensor Data Attestation in Smart Environment., , , , , , and . NCA, page 1-9. IEEE, (2019)IoT Notary: Attestable Sensor Data Capture in IoT Environments., , , , , , and . ACM Trans. Internet Things, 3 (1): 3:1-3:30 (2022)