Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Distributed Linear Programming with Limited Disclosure., , and . DBSec, volume 6818 of Lecture Notes in Computer Science, page 170-185. Springer, (2011)UICDS compliant resource management system for emergency response., , , and . DG.O, page 23-31. Digital Government Research Center, (2010)Enforcing Separation of Duty in Attribute Based Access Control Systems., , , and . ICISS, volume 9478 of Lecture Notes in Computer Science, page 61-78. Springer, (2015)Attacking Image Based CAPTCHAs Using Image Recognition Techniques., , , , and . ICISS, volume 7671 of Lecture Notes in Computer Science, page 327-342. Springer, (2012)Sentiment based Analysis of Tweets during the US Presidential Elections., , , and . DG.O, page 1-10. ACM, (2017)Privacy-Preserving Outlier Detection., and . ICDM, page 233-240. IEEE Computer Society, (2004)Attribute-Based Access Control for NoSQL Databases., , , and . CODASPY, page 317-319. ACM, (2021)Privacy Preserving Naïve Bayes Classifier for Vertically Partitioned Data., and . SDM, page 522-526. SIAM, (2004)A Service-oriented Framework for Developing Personalized Patient Care Plans for COVID-19., , , , and . DG.O, page 234-241. ACM, (2021)Enabling Attribute-Based Access Control in Linux Kernel., , , and . AsiaCCS, page 1237-1239. ACM, (2022)