Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-channel overlay protocols: Implementing ad-hoc message authentication in social media platforms., , and . CyberSA, page 1-6. IEEE, (2015)Enhanced Virtual Private Social Networks: Implementing user content confidentiality., , and . ICITST, page 306-312. IEEE, (2013)Ensuring Message Freshness in A Multi-Channel SMS Steganographic Banking Protocol., , , and . Cyber Security, page 1-7. IEEE, (2018)A multi-channel steganographic protocol for secure SMS mobile banking., , , and . ICITST, page 248-253. IEEE, (2017)Dual carrier steganographic messaging protocols for mobile messaging applications.. Kingston University, Kingston upon Thames, London, UK, (2016)British Library, EThOS.Hide-as-you-Type: An Approach to Natural Language Steganography through Sentence Modification., , and . HPCC/CSS/ICESS, page 945-952. IEEE, (2014)Online Evaluation of Point-Of-Interest Recommendation Systems., , , and . SCST@ECIR, volume 1338 of CEUR Workshop Proceedings, CEUR-WS.org, (2015)KnowFIRES: A Knowledge-Graph Framework for Interpreting Retrieved Entities from Search., , , , and . ECIR (5), volume 14612 of Lecture Notes in Computer Science, page 182-188. Springer, (2024)Made to Measure: A Workshop on Human-Centred metrics for information seeking., , and . CHIIR, page 461-462. ACM, (2023)Visualizing Searcher Gaze Patterns., , and . CHIIR, page 295-299. ACM, (2021)