Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game-Based Verification of Multi-Party Contract Signing Protocols., , , and . Formal Aspects in Security and Trust, volume 5983 of Lecture Notes in Computer Science, page 186-200. Springer, (2009)DeepCity: A Feature Learning Framework for Mining Location Check-Ins., and . ICWSM, page 652-655. AAAI Press, (2017)A Strand Space Approach to Provable Anonymity., and . FTSCS, volume 419 of Communications in Computer and Information Science, page 71-87. Springer, (2013)The Persuasive Impact of Emoticons in Online Word-of-Mouth Communication., , , and . PACIS, page 122. (2016)Privacy and verifiability in voting systems: Methods, developments and trends., , and . Comput. Sci. Rev., (2013)Semantic and Relational Spaces in Science of Science: Deep Learning Models for Article Vectorisation., , , and . CoRR, (2020)An Efficient Approach Towards the Source-Target Control of Boolean Networks., , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 17 (6): 1932-1945 (2020)An active learning-based approach for location-aware acquaintance inference., , , , and . Knowl. Inf. Syst., 59 (3): 539-569 (2019)Membership Inference of Diffusion Models., and . CoRR, (2023)Formal modelling and analysis of receipt-free auction protocols in applied pi., , and . Comput. Secur., (2017)