Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial.. IEEE Trans. Serv. Comput., 13 (1): 1-2 (2020)Ontology-based access control for social network systems., and . Int. J. Inf. Priv. Secur. Integr., 1 (1): 59-78 (2011)NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets., , and . CoRR, (2020)Access Control in Dynamic XML-Based Web-Services with X-RBAC., , , and . ICWS, page 243-249. CSREA Press, (2003)Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions., and . TPS-ISA, page 226-235. IEEE, (2020)Towards Modernizing the Future of American Voting., , and . CIC, page 130-135. IEEE Computer Society, (2018)Mining Historical Data towards Interference Management in Wireless SDNs., , , and . Q2SWinet@MSWiM, page 81-88. ACM, (2017)Synthetic Information and Digital Twins for Pandemic Science: Challenges and Opportunities., , , , , , , , , and 2 other author(s). TPS-ISA, page 23-33. IEEE, (2023)Security for grid-based computing systems issues and challenges., , , , and . SACMAT, page 125. ACM, (2004)LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users., , and . GIS, page 464-467. ACM, (2009)