Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modified electric current perturbation (ECP) characterization for a circular aperture., and . IEEE Trans. Instrumentation and Measurement, 55 (1): 212-218 (2006)Local Intermolecular Order Controls Photoinduced Charge Separation at Donor/Acceptor Interfaces in Organic Semiconductors, , , , , , , and . Advanced Energy Materials, 6 (6): n/a--n/a (2016)A User-Activity-Centric Framework for Access Control in Online Social Networks., , and . IEEE Internet Comput., 15 (5): 62-65 (2011)Are you satisfied or satiated by the games you play? An empirical study about game play and purchase patterns by genres., and . Telematics Informatics, (2021)An Analysis of Cybersecurity Legislation and Policy Creation on the State Level., , , , , and . NCS, volume 1055 of Advances in Intelligent Systems and Computing, page 30-43. Springer, (2019)An Efficient Logic Equivalence Checker for Industrial Circuits., , , and . J. Electron. Test., 16 (1-2): 91-106 (2000)Classifying and Comparing Attribute-Based and Relationship-Based Access Control., , and . CODASPY, page 59-70. ACM, (2017)A logical specification for usage control., , , and . SACMAT, page 1-10. ACM, (2004)Formal model and policy specification of usage control., , , and . ACM Trans. Inf. Syst. Secur., 8 (4): 351-387 (2005)The UCONABC usage control model., and . ACM Trans. Inf. Syst. Secur., 7 (1): 128-174 (2004)