Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy of outsourced k-means clustering., , and . AsiaCCS, page 123-134. ACM, (2014)A temporal key management scheme for secure broadcasting of XML documents., , and . ACM Conference on Computer and Communications Security, page 31-40. ACM, (2002)5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol., , , , and . ACM Conference on Computer and Communications Security, page 669-684. ACM, (2019)A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model., , , and . IEEE Trans. Inf. Forensics Secur., 8 (6): 949-962 (2013)Real-time Digital Signatures for Named Data Networking., , and . ICN, page 149-151. ACM, (2020)Elite size and resilience impact on global system structuration in social media., , , , , and . CTS, page 9-10. IEEE, (2014)Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies., , , and . ICICS, volume 4861 of Lecture Notes in Computer Science, page 386-397. Springer, (2007)Adaptive Management of Multigranular Spatio-Temporal Object Attributes., , , and . SSTD, volume 5644 of Lecture Notes in Computer Science, page 320-337. Springer, (2009)The Challenge of Assuring Data Trustworthiness., , and . DASFAA, volume 5463 of Lecture Notes in Computer Science, page 22-33. Springer, (2009)Specification and enforcement of flexible security policy for active cooperation., , , , and . Inf. Sci., 179 (15): 2629-2642 (2009)