Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Artificial intelligence ethics guidelines for developers and users: clarifying their content and normative implications., and . J. Inf. Commun. Ethics Soc., 19 (1): 61-86 (2021)In AI We Trust: Ethics, Artificial Intelligence, and Reliability.. Sci. Eng. Ethics, 26 (5): 2749-2767 (2020)Software Package Requirements and Procurement., , and . IWSSD, page 141-145. IEEE Computer Society, (1996)Automatic verification of transparency protocols., , and . EuroS&P, page 107-121. IEEE, (2023)Untraceability in the applied pi-calculus., , , and . ICITST, page 1-6. IEEE, (2009)A Trusted Infrastructure for P2P-based Marketplaces., , and . Peer-to-Peer Computing, page 151-154. IEEE, (2009)Privacy Supporting Cloud Computing: ConfiChair, a Case Study., , and . POST, volume 7215 of Lecture Notes in Computer Science, page 89-108. Springer, (2012)Towards a Verified Reference Implementation of a Trusted Platform Module., , and . Security Protocols Workshop, volume 7028 of Lecture Notes in Computer Science, page 69-81. Springer, (2009)Approximating ATL* in ATL., , and . VMCAI, volume 2294 of Lecture Notes in Computer Science, page 289-301. Springer, (2002)Mixed-Depth Representations of Natural Language Text, and . Text-Based Intelligent Systems: Current research and practice in information extraction and retrieval, Lawrence Erlbaum, Hillsdale (New Jersey), Hove and London, (1992)