Author of the publication

Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation.

, and . SECRYPT, page 620-627. SCITEPRESS, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting Users in Cloud Plan Selection., , , , and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 244-260. Springer, (2018)Application requirements with preferences in cloud-based information processing., , and . RTSI, page 1-4. IEEE, (2016)Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud., , , and . The New Codebreakers, volume 9100 of Lecture Notes in Computer Science, page 205-239. Springer, (2016)Explainability of the Effects of Non-Perturbative Data Protection in Supervised Classification., , , and . WI/IAT, page 402-408. IEEE, (2023)A consensus-based approach for selecting cloud plans., , , and . RTSI, page 1-6. IEEE, (2016)Assessing Document Sanitization for Controlled Information Release and Retrieval in Data Marketplaces., , and . CLEF (1), volume 14958 of Lecture Notes in Computer Science, page 88-99. Springer, (2024)Toward Owners' Control in Digital Data Markets., , , and . IEEE Syst. J., 15 (1): 1299-1306 (2021)Empowering Owners with Control in Digital Data Markets., , , and . CLOUD, page 321-328. IEEE, (2019)Anonymization of Statistical Data (Anonymisierung von statistischen Daten)., , , and . it - Information Technology, 53 (1): 18-25 (2011)Unveiling the Privacy Risk: A Trade-Off Between User Behavior and Information Propagation in Social Media., , and . COMPLEX NETWORKS (4), volume 1144 of Studies in Computational Intelligence, page 277-290. Springer, (2023)