Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Client-Server Approach to Capture Web Browsing History., and . Security and Management, page 357-362. CSREA Press, (2008)Data Mining and Anonymous Opt-out., , and . Security and Management, page 297-303. CSREA Press, (2009)On Petri Nets and Predicate-Transition Nets., and . Software Engineering Research and Practice, page 903-909. CSREA Press, (2006)A Heuristic Algorithm for Finding Edge Disjoint Cycles in Graphs., and . ICSOFT (Selected Papers), volume 170 of Communications in Computer and Information Science, page 191-202. Springer, (2010)Cryptographic Features, Applications: Java (C).. ICSOFT (PL/DPS/KE), page 5. INSTICC Press, (2008)Open-Source Oriental Game and Endgame Database., and . ICIAI, page 167-171. ACM, (2019)Privacy Preserving Data Sharing With Anonymous ID Assignment., and . IEEE Trans. Inf. Forensics Secur., 8 (2): 402-413 (2013)Indirect Disclosures in Data Mining., and . FCST, page 346-350. IEEE Computer Society, (2009)On Privacy Preserving Encrypted Data Stores., , and . MUE, volume 240 of Lecture Notes in Electrical Engineering, page 219-226. Springer, (2013)Notes on Privacy-preserving Distributed Mining and Hamiltonian Cycles., and . ICSOFT (1), page 103-107. SciTePress, (2010)