Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Forensic Pattern-Based Approach for Investigations in Cloud System Environments., and . CSNet, page 1-8. IEEE, (2018)CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework., , , , , and . Financial Cryptography Workshops, volume 9604 of Lecture Notes in Computer Science, page 319-327. Springer, (2016)CloudProtect: Managing Data Privacy in Cloud Applications., , , , and . IEEE CLOUD, page 303-310. IEEE Computer Society, (2012)IoT Notary: Sensor Data Attestation in Smart Environment., , , , , , and . NCA, page 1-9. IEEE, (2019)A privacy-enabled platform for COVID-19 applications: poster abstract., , , , , , , , , and 5 other author(s). SenSys, page 745-746. ACM, (2020)Architectural support for trust models in decentralized applications., , , and . ICSE, page 52-61. ACM, (2006)AutoMigrate: A Framework for Developing Intelligent, Self-Managing Cloud Services with Maximum Availability., , , , and . ICCAC, page 95-106. IEEE Computer Society, (2016)Trustworthy Sensing in an Untrusted IoT Environment., , , and . PerCom Workshops, page 468-471. IEEE Computer Society, (2018)Trustworthy Privacy Policy Translation in Untrusted IoT Environments., , , and . IoTBDS, page 132-143. SciTePress, (2018)Homomorphic Encryption for Secure Computation on Big Data., , , and . IoTBDS, page 340-347. SciTePress, (2018)