Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart Meter Data Analysis., , , , and . ICC 2016, page 22:1-22:6. ACM, (2016)On d-antimagic labelings of plane graphs., , , , and . Electron. J. Graph Theory Appl., 1 (1): 28-39 (2013)A Framework for Privacy Preserving Classification in Data Mining., and . ACSW, volume 32 of CRPIT, page 163-168. Australian Computer Society, (2004)Usability of Compromise-Free Statistical Databases, , , and . SSDBM, page 144-154. IEEE Computer Society, (1997)2-Compromise Usability in 1-Dimensional Statistical Databases., and . COCOON, volume 2387 of Lecture Notes in Computer Science, page 448-455. Springer, (2002)On the Linearity of Cryptographic Sequence Generators., , and . ICCSA (2), volume 6017 of Lecture Notes in Computer Science, page 586-596. Springer, (2010)Multi-guarded safe zone: An effective technique to monitor moving circular range queries., , , , and . ICDE, page 189-200. IEEE Computer Society, (2010)Privacy-Preserving Data Mining., , and . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)An Overview of Security Issues and Techniques in Mobile Agents., and . Communications and Multimedia Security, volume 175 of IFIP, page 59-78. Springer, (2004)Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules., and . DaWaK, volume 1676 of Lecture Notes in Computer Science, page 389-398. Springer, (1999)