Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Interoperability in Multi-domain Enterprise Right Management Applications., and . ICISSP (Revised Selected Papers), volume 1221 of Communications in Computer and Information Science, page 382-402. Springer, (2019)Steganography Using Modern Arts., and . IFIP TCS, volume 1872 of Lecture Notes in Computer Science, page 140-151. Springer, (2000)Auctions for Partial Heterogeneous Preferences., , , and . MFCS, volume 8087 of Lecture Notes in Computer Science, page 183-194. Springer, (2013)Biometric/Cryptographic Keys Binding Based on Function Minimization., , and . SITIS, page 144-150. IEEE Computer Society, (2016)A Novel Approach to Proactive Password Checking., , , and . InfraSec, volume 2437 of Lecture Notes in Computer Science, page 30-39. Springer, (2002)TRUST: TRust Unguarded Service Terminals., , , , , and . I-SPAN, volume 1080 of Communications in Computer and Information Science, page 155-169. Springer, (2019)An Integrated Formal Approach to Usage Control., , , and . IEEE Symposium on Security and Privacy Workshops, page 8-12. IEEE Computer Society, (2013)On Tracking Ransomware on the File System., and . ICISSP, page 210-219. SCITEPRESS, (2022)Inference-proof Data Filtering for a Probabilistic Setting., , , and . PrivOn@ISWC, volume 1951 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Hyppocrates., , , and . ISC, volume 2200 of Lecture Notes in Computer Science, page 63-80. Springer, (2001)