Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Enclave for TLS Web Server on Untrusted Environment., , , , , and . ICCNS, page 27-31. ACM, (2017)Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods., , , and . ISDDC, volume 11317 of Lecture Notes in Computer Science, page 38-49. Springer, (2018)Visual suggestions for improvements in business process diagrams., and . J. Vis. Lang. Comput., 22 (5): 385-399 (2011)D2IA: User-defined interval analytics on distributed streams., , , , , and . Inf. Syst., (2022)Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords., , and . Secur. Priv., (2019)Reversible Logic Synthesis Using Binary Decision Diagrams With Exploiting Efficient Reordering Operators., , and . IEEE Access, (2020)A Decentralised Public Key Infrastructure for X-Road., , , , and . ARES, page 128:1-128:8. ACM, (2023)RBPSim: A Resource-aware Extension of BPSim Using Workflow Resource Patterns., , and . ZEUS, volume 2072 of CEUR Workshop Proceedings, page 32-39. CEUR-WS.org, (2018)Benchmarking Concept Drift Detectors for Online Machine Learning., , , and . MEDI, volume 13761 of Lecture Notes in Computer Science, page 43-57. Springer, (2022)C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments., , , and . CAiSE, volume 13901 of Lecture Notes in Computer Science, page 437-453. Springer, (2023)