Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attribute Evaluation using Neighbour Functions, and . 112. Dept. of Informatics, University of Bergen, (December 1995)A Multi-level Data Sensitivity Model for Mobile Health Data Collection Systems., , and . WorldCIST (3), volume 932 of Advances in Intelligent Systems and Computing, page 547-556. Springer, (2019)Secure data storage for mobile data collection systems., , , , and . MEDES, page 131-144. ACM, (2012)A Reflection-Based Framework for Content Validation., , and . ARES, page 697-706. IEEE Computer Society, (2007)Secure data storage for Java ME-based mobile data collection systems., , , , and . Healthcom, page 498-501. IEEE, (2012)Secure Mobile Data Collection Systems for Low-Budget Settings., , , , and . ARES, page 196-205. IEEE Computer Society, (2012)Simplifying Client-Server Application Development with Secure Reusable Components., , , and . ISSSE, (2006)Form-based security in mobile health data collection systems., , , and . Secur. Priv., (2021)Control Flow Aspects of Generating Runtime Facilities for Language-based Programming Environments. IEEE Conf. on Software Tools, New York, NY, (April 1985)Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings., , , , and . ESSoS, volume 7159 of Lecture Notes in Computer Science, page 38-45. Springer, (2012)