Author of the publication

CURIOS Mobile: Linked Data Exploitation for Tourist Mobile Apps in Rural Areas.

, , , , , and . JIST, volume 8943 of Lecture Notes in Computer Science, page 129-145. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Non-interactive Simulation: Hardness & Feasibility., , and . IACR Cryptology ePrint Archive, (2020)Secure Non-interactive Simulation from Arbitrary Joint Distributions., , and . TCC (2), volume 13748 of Lecture Notes in Computer Science, page 378-407. Springer, (2022)Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions)., , , and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 36-65. Springer, (2018)Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source., , and . IACR Cryptol. ePrint Arch., (2021)A Power Consumption Benchmark Framework for Ontology Reasoning on Android Devices., , and . ORE, volume 1387 of CEUR Workshop Proceedings, page 80-86. CEUR-WS.org, (2015)Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks., , , , , , and . ISIT, page 976-981. IEEE, (2021)P4-free Partition and Cover Numbers., , , , , and . IACR Cryptol. ePrint Arch., (2020)Unconditional Security using (Random) Anonymous Bulletin Board., , , and . IACR Cryptol. ePrint Arch., (2024)Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences., , , , , , and . ITC, volume 230 of LIPIcs, page 16:1-16:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)CURIOS: Web-based Presentation and Management of Linked Datasets., , , , , , and . ISWC (Posters & Demos), volume 1272 of CEUR Workshop Proceedings, page 249-252. CEUR-WS.org, (2014)