Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a private vector space model for confidential documents., , and . SAC, page 944-945. ACM, (2013)LockDown: Balance Availability Attack against Lightning Network Channels., , , , and . IACR Cryptol. ePrint Arch., (2019)Towards efficient access control in a mobile agent based wireless sensor network., , , and . CRiSIS, page 1-4. IEEE Computer Society, (2012)Data Privacy with R R., , and . Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, Springer, (2015)Advanced Research on Data Privacy in the ARES Project., and . Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, Springer, (2015)Supervised learning using a symmetric bilinear form for record linkage., , and . Inf. Fusion, (2015)Provenance and Privacy., , , and . MDAI, volume 10571 of Lecture Notes in Computer Science, page 3-11. Springer, (2017)LockDown: Balance Availability Attack Against Lightning Network Channels., , , , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 245-263. Springer, (2020)Agent mobility architecture based on IEEE-FIPA standards., , , , , and . Comput. Commun., 32 (4): 712-729 (2009)Privacy-preserving data-mining through micro-aggregation for web-based e-commerce., and . Internet Res., 20 (3): 366-384 (2010)