Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud., , and . TrustCom/BigDataSE/ISPA (1), page 563-570. IEEE, (2015)From Linked Data to Relevant Data -- Time is the Essence, , and . CoRR, (2011)Automating Compliance for Cloud Computing Services., , , and . CLOSER, page 631-637. SciTePress, (2012)Where is the human in human-centered AI? Insights from developer priorities and user experiences., , , , , , , , , and . Comput. Hum. Behav., (April 2023)Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools., , and . SSCC, volume 1364 of Communications in Computer and Information Science, page 1-20. Springer, (2020)Unified Model for Data Security - A Position Paper., and . TrustCom, page 831-839. IEEE Computer Society, (2014)Escrow: A Large-Scale Web Vulnerability Assessment Tool., and . TrustCom, page 983-988. IEEE Computer Society, (2014)Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography., , and . TrustCom/BigDataSE/ICESS, page 1024-1031. IEEE Computer Society, (2017)Dynamic Collaborative Business Process Formulation via Ontologised Hierarchical Task Network (HTN) Planning., , , and . ICWS, page 959-967. IEEE Computer Society, (2009)Consumer-centric protection for online social networks., , and . IRI, page 62-67. IEEE Computer Society, (2014)