Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Cloud Storage with Client-side Encryption using a Trusted Execution Environment., , , , , and . CLOSER, page 31-43. SCITEPRESS, (2020)Confidential computing in cloud/fog-based Internet of Things scenarios., , , , , and . Internet Things, (2022)Assisting the continuous improvement of Scrum projects using metrics and Bayesian networks., , , and . J. Softw. Evol. Process., (2017)Trusted Client-Side Encryption for Cloud Storage., , , , , and . CLOSER (Selected Papers), volume 1399 of Communications in Computer and Information Science, page 1-24. Springer, (2020)Dynamic and Interoperable Control of IoT Devices and Applications based on Calvin Framework., , , , and . SEKE, page 221-296. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)A Standard-Based and Context-Aware Architecture for Personal Healthcare Smart Gateways., , , and . J. Medical Syst., 40 (10): 224:1-224:14 (2016)Trusted and only Trusted. That is the Access! - Improving Access Control Allowing only Trusted Execution Environment Applications., , , , and . AINA (3), volume 655 of Lecture Notes in Networks and Systems, page 490-503. Springer, (2023)Hardware Synthesis for Asynchronous Communications Mechanisms., and . SCCC, page 135-143. IEEE Computer Society, (2008)A Bayesian Networks-Based Method to Analyze the Validity of the Data of Software Measurement Programs., , , , , , and . IEEE Access, (2020)Improving the Applicability of the Ranked Nodes Method to build Expert-Driven Bayesian Networks (S)., , , , , and . SEKE, page 165-220. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)