Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trustworthy Privacy Policy Translation in Untrusted IoT Environments., , , and . IoTBDS, page 132-143. SciTePress, (2018)DataVault: secure mobile access and data sharing., , , and . Netw. Secur., 2011 (5): 16-19 (2011)Obscure: Information-Theoretic Oblivious and Verifiable Aggregation Queries., , , , , and . Proc. VLDB Endow., 12 (9): 1030-1043 (2019)MIDE: Accuracy Aware Minimally Invasive Data Exploration For Decision Support., , , and . Proc. VLDB Endow., 15 (11): 2653-2665 (2022)CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes., , , , and . ACM Trans. Cyber Phys. Syst., 5 (1): 3:1-3:34 (2021)Exploiting Data Sensitivity on Partitioned Data., , and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 274-299. Springer, (2018)Ensuring Transaction Atomicity in Multidatabase Systems., , , , and . PODS, page 164-175. ACM Press, (1992)On Correctness of Non-serializable Executions., , , , and . PODS, page 97-108. ACM Press, (1993)Browsing and retrieving video content in a unified framework., , and . MMSP, page 9-14. IEEE, (1998)Towards Reliable Application Data Broadcast in Wireless Ad Hoc Networks., , , , and . WCNC, page 4063-4068. IEEE, (2007)