Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A clustering analysis and agent-based trust model in a grid environment supporting virtual organisations., and . IJWGS, 5 (1): 3-16 (2009)LoRaDrone: Enabling Low-Power LoRa Data Transmission via a Mobile Approach., , , , , , and . MSN, page 239-246. IEEE, (2022)Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks., , , , , , and . NDSS, The Internet Society, (2023)A novel Website Fingerprinting attack against multi-tab browsing behavior., , and . CSCWD, page 234-239. IEEE, (2015)AIM: A New Privacy Preservation Algorithm for Incomplete Microdata Based on Anatomy., , and . ICPCA/SWS, volume 7719 of Lecture Notes in Computer Science, page 194-208. Springer, (2012)MPSL: A Mobile Phone-Based Physical-Social Location Verification System., , , , and . WASA, volume 7405 of Lecture Notes in Computer Science, page 488-499. Springer, (2012)Courseware Recommendation in E-Learning System., , and . ICWL, volume 4181 of Lecture Notes in Computer Science, page 10-24. Springer, (2006)A Cooperative Game Theory Based Coalitional Agent Negotiation Model in Network Service., and . CSCWD (Selected Papers), volume 4402 of Lecture Notes in Computer Science, page 447-458. Springer, (2006)A Grid Information Services Architecture Based on Structured P2P Systems., , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 374-383. Springer, (2007)A Replica Replacement Algorithm Based on Value-Cost Prediction., , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 365-373. Springer, (2007)