Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models., , and . ICATPN, volume 1420 of Lecture Notes in Computer Science, page 266-285. Springer, (1998)Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions., , , and . SmartGridComm, page 324-329. IEEE, (2012)Building robust temporal user profiles for anomaly detection in file system accesses., and . PST, page 207-210. IEEE, (2016)Generating Client Side Policies for Cyber-Physical Safety., , , , and . ICCCN, page 1-8. IEEE, (2019)PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets., , , , , , and . WWW, page 594-604. ACM, (2019)The ADKMS Knowledge Acquisition System., , , , , and . Future Databases, volume 3 of Advanced Database Research and Development Series, page 298-314. World Scientific, Singapore, (1992)Security of graph data: hashing schemes and definitions., , , , and . CODASPY, page 223-234. ACM, (2014)A Semi-automatic System for Conceptual Annotation, its Application to Resource Construction and Evaluation., , , , , , , , and . LREC, European Language Resources Association, (2000)Conditional Privacy-Aware Role Based Access Control., , , and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 72-89. Springer, (2007)Privacy-Preserving Database Systems., , and . FOSAD, volume 3655 of Lecture Notes in Computer Science, page 178-206. Springer, (2005)