Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robustness of Social Networks: Comparative Results Based on Distance Distributions., , and . SocInfo, volume 6984 of Lecture Notes in Computer Science, page 8-21. Springer, (2011)Access Control for Social Care Platforms Using Fast Healthcare Interoperability Resources., , and . WorldCIST (3), volume 932 of Advances in Intelligent Systems and Computing, page 94-104. Springer, (2019)O-IPCAC and its Application to EEG Classification., , , and . WAPA, volume 11 of JMLR Proceedings, page 4-11. JMLR.org, (2010)A Parser to Support the Definition of Access Control Policies and Rules Using Natural Languages., , , and . J. Medical Syst., 44 (2): 41 (2020)Distributed Shuffle Index in the Cloud: Implementation and Evaluation., , , , , and . CSCloud, page 139-144. IEEE Computer Society, (2017)Multi-Provider Secure Processing of Sensors Data., , , , , , , and . PerCom Workshops, page 349-351. IEEE, (2019)Arc-Community Detection via Triangular Random Walks., and . LA-WEB, page 48-56. IEEE Computer Society, (2012)Logging Integrity with Blockchain Structures., , and . WorldCIST (3), volume 932 of Advances in Intelligent Systems and Computing, page 83-93. Springer, (2019)Four Degrees of Separation, , , , and . CoRR, (2011)Bringing Access Control Tree to Big Data., and . ETAA@ESORICS, volume 11263 of Lecture Notes in Computer Science, page 17-29. Springer, (2018)