Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems, , and . CoRR, (2013)PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios., , and . CRITIS, volume 4347 of Lecture Notes in Computer Science, page 151-165. Springer, (2006)WAP PKI and certification path validation., , and . Int. J. Internet Protoc. Technol., 2 (2): 88-95 (2007)H-OCSP: A protocol to reduce the processing burden in online certificate status validation., , , and . Electron. Commer. Res., 8 (4): 255-273 (2008)Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts., , , , and . DEXA, volume 2736 of Lecture Notes in Computer Science, page 927-936. Springer, (2003)On Web user tracking: How third-party http requests track users' browsing patterns for personalised advertising., , and . Med-Hoc-Net, page 1-6. IEEE, (2016)Reducing the Computational Cost of Certification Path Validation in Mobile Payment., , , and . EuroPKI, volume 4582 of Lecture Notes in Computer Science, page 280-296. Springer, (2007)Implementation of an Efficient Authenticated Dictionary for Certificate Revocation., , , and . ISCC, page 238-243. IEEE Computer Society, (2003)A protocol for detecting malicious hosts based on limiting the execution time of mobile agents., , , and . ISCC, page 251-256. IEEE Computer Society, (2003)Smart Deferral of Messages for Privacy Protection in Online Social Networks., , , and . CoRR, (2014)