Author of the publication

TRUST: TRust Unguarded Service Terminals.

, , , , , and . I-SPAN, volume 1080 of Communications in Computer and Information Science, page 155-169. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study of Dynamic Graph Algorithms., , and . ACM Journal of Experimental Algorithmics, (1997)Informational and linguistic analysis of large genomic sequence collections via efficient Hadoop cluster algorithms., , , and . Bioinform., 34 (11): 1826-1833 (2018)Maintaining Dynamic Minimum Spanning Trees: An Experimental Study., , , and . ALENEX, volume 2409 of Lecture Notes in Computer Science, page 111-125. Springer, (2002)Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG Images., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 643-652. Springer, (2014)Automatic, Selective and Secure Deletion of Digital Evidence., , , and . BWCCA, page 392-398. IEEE Computer Society, (2011)Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education., , , , , , and . SoftCOM, page 1-5. IEEE, (2012)A Lightweight Security Model for WBEM., , , and . OTM Workshops, volume 2889 of Lecture Notes in Computer Science, page 975-988. Springer, (2003)Effects of H.265 encoding on PNU and source camera identification., and . RACS, page 279-284. ACM, (2018)An Efficient Implementation of the Algorithm by Lukáš et al. on Hadoop., , , , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 475-489. (2017)TRUST: TRust Unguarded Service Terminals., , , , , and . I-SPAN, volume 1080 of Communications in Computer and Information Science, page 155-169. Springer, (2019)