Author of the publication

User Identification of Pseudonyms without Identity Information Exposure in Access Federations.

, , and . COMPSAC, page 487-492. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A resource-oriented grid meta-scheduler based on agents., and . Parallel and Distributed Computing and Networks, page 108-113. IASTED/ACTA Press, (2007)Improved S-CDAs using crossover controlling the number of crossed genes for many-objective optimization., , and . GECCO, page 753-760. ACM, (2011)Control of Crossed Genes Ratio for Directed Mating in Evolutionary Constrained Multi-Objective Optimization., , and . GECCO (Companion), page 1201-1204. ACM, (2015)Local dominance and controlling dominance area of solutions in multi and many objectives EAs., , and . GECCO (Companion), page 1811-1814. ACM, (2008)Communication in Linda/Q : Datatypes and Unification., and . ICPP (2), page 219-226. CRC Press, (1991)An Application Framework for Smart Education System Based on Mobile and Cloud Systems., , , , and . IEICE Trans. Inf. Syst., 100-D (10): 2399-2410 (2017)Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach., , , , and . J. Inf. Process., 22 (3): 464-471 (2014)Sensing In-Air Signature Motions Using Smartwatch: A High-Precision Approach of Behavioral Authentication., and . IEEE Access, (2022)A Riemannian Optimization Approach to the Matrix Singular Value Decomposition., and . SIAM J. Optim., 23 (1): 188-212 (2013)Computational Complexity and Performance of RAKE Receivers with Channel Estimation for DS-UWB., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (9): 2318-2326 (2005)