Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Holistic Approaches to Secure e-Business: A Critical Review., , , and . CSREA EEE, page 245-251. CSREA Press, (2008)Applied Health Informatics for Diagnosis of Multi-factorial Diseases., , , , , , and . IKE, page 571-575. CSREA Press, (2009)Establishing Mobile NFC Payment Systems and Future Prospect., , , , , , , , , and . IKE, page 404-410. CSREA Press, (2008)Securing the Smart City: Patterns of Public Acceptance for Integrated Technological Solutions., , and . ISC2, page 1-6. IEEE, (2023)An Intelligent Agent Based Approach to MOSAICA's Pedagogical Framework., , and . ICEIS (4), page 219-226. (2007)A System for Semantically Enhanced, Multifaceted, Collaborative Access: Requirements and Architecture., , , , , , , , , and . ITNG, page 1051-1056. IEEE Computer Society, (2007)Collaborative access through semantically enhanced distributed & diversified cultural content., , , , , , , , , and . CTS, page 406-413. IEEE, (2007)Immerse: A Personalized System Addressing the Challenges of Migrant Integration., , , , , , , , and . ICME Workshops, page 1-6. IEEE, (2020)A Study of Encrypted, Tunneling Models in Virtual Private Networks., , , and . ITCC, page 139-143. IEEE Computer Society, (2002)Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence?, and . ICGS3, volume 534 of Communications in Computer and Information Science, page 15-20. Springer, (2015)