Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Personalized Privacy Policy Recommendations on Online Social Networks., and . ICISSP, page 126-137. SciTePress, (2016)Enabling Co-owned Image Privacy on Social Media via Agent Negotiation., , , and . iiWAS, page 152-156. ACM, (2021)On Monitoring Information Flow of Outsourced Data.. ISSA, ISSA, Pretoria, South Africa, (2010)Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization., , and . CODASPY, page 109-119. ACM, (2019)Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids., , , and . ISGT Asia, page 1-6. IEEE, (2015)A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media., , and . AINA (1), volume 449 of Lecture Notes in Networks and Systems, page 140-151. Springer, (2022)A Review of Scaling Genome Sequencing Data Anonymisation., , and . AINA (3), volume 227 of Lecture Notes in Networks and Systems, page 491-501. Springer, (2021)Graphical Passwords - A Discussion.. AINA Workshops, page 596-600. IEEE Computer Society, (2016)Adaptive Cryptographic Access Control, , and . Advances in Information Security Springer, (2010)How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect., , , and . PDH, page 55-62. ACM, (2019)