Author of the publication

Enhanced Virtual Private Social Networks: Implementing user content confidentiality.

, , and . ICITST, page 306-312. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced Virtual Private Social Networks: Implementing user content confidentiality., , and . ICITST, page 306-312. IEEE, (2013)Multi-channel overlay protocols: Implementing ad-hoc message authentication in social media platforms., , and . CyberSA, page 1-6. IEEE, (2015)Ensuring Message Freshness in A Multi-Channel SMS Steganographic Banking Protocol., , , and . Cyber Security, page 1-7. IEEE, (2018)Dual carrier steganographic messaging protocols for mobile messaging applications.. Kingston University, Kingston upon Thames, London, UK, (2016)British Library, EThOS.A multi-channel steganographic protocol for secure SMS mobile banking., , , and . ICITST, page 248-253. IEEE, (2017)Hide-as-you-Type: An Approach to Natural Language Steganography through Sentence Modification., , and . HPCC/CSS/ICESS, page 945-952. IEEE, (2014)Passage-based query refinement (MultiText experiments for TREC-6)., , , and . Inf. Process. Manag., 36 (1): 133-153 (2000)Adding Full-Text Filesystem Search to Linux., and . login Usenix Mag., (2006)Human Competence in Creativity Evaluation., , and . ICCC, page 102-109. computationalcreativity.net, (2015)University of Waterloo at TREC 2010: Legal Interactive., , , and . TREC, volume 500-294 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2010)