Author of the publication

Private Data Management in Collaborative Environments.

, , , , , , and . CDVE, volume 4674 of Lecture Notes in Computer Science, page 88-96. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private Data Management in Collaborative Environments., , , , , , and . CDVE, volume 4674 of Lecture Notes in Computer Science, page 88-96. Springer, (2007)Ethical and Secure Data Sharing across Borders., , and . Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, page 136-140. Springer, (2012)A QoE Sensitive Architecture for Advanced Collaborative Environments., , , , , , , and . QSHINE, page 319-322. IEEE Computer Society, (2004)Perception and acceptance of fingerprint biometric technology., , and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 153-154. ACM, (2007)Facing the facts about image type in recognition-based graphical passwords., , and . ACSAC, page 149-158. ACM, (2011)Panel: Usable Cryptography: Manifest Destiny or Oxymoron?., and . Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, page 302-306. Springer, (2008)Exploring User Reactions to New Browser Cues for Extended Validation Certificates., , , and . ESORICS, volume 5283 of Lecture Notes in Computer Science, page 411-427. Springer, (2008)Private Data Discovery for Privacy Compliance in Collaborative Environments., , , , , , , , and . CDVE, volume 5220 of Lecture Notes in Computer Science, page 142-150. Springer, (2008)Usability and Acceptability of Biometric Security Systems.. Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, page 105. Springer, (2004)From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions., and . Privacy Enhancing Technologies, volume 2760 of Lecture Notes in Computer Science, page 107-124. Springer, (2003)