Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Preserving Morphological Operations for Digital Images., , and . COMM, page 183-188. IEEE, (2020)Monoidal Encryption over (F_2, ) ( F 2 , · )., , and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 504-517. Springer, (2018)A formal framework for multimedia adaptation revisited: a metadata perspective., , and . BTW Workshops, page 160-178. Verlagshaus Mainz, Aachen, (2007)Efficient and robust perceptual hashing using log-polar image representation., and . COMM, page 1-6. IEEE, (2014)Supervision de contenus multimédia: Adaptation de contenu, politiques optimales de préchargement et coordination causale de flux. (Stream supervision for multimedia contents / Stream supervision for multimedia contents: Content adaptation, optimal prefetching policies and causal coordination).. National Polytechnic Institute of Toulouse, France, (2007)Fast Searching in Image Databases Using Multi-index Robust Fingerprinting., , and . SECITC, volume 9522 of Lecture Notes in Computer Science, page 267-279. Springer, (2015)A Coordination-Level Middleware for Supporting Flexible Consistency in CSCW., , , , and . PDP, page 316-321. IEEE Computer Society, (2006)A Flexible Communication Toolkit for Synchronous Groupware., , , and . Systems Communications, page 216-221. IEEE Computer Society, (2005)Streaming with causality: a practical approach., , , and . ACM Multimedia, page 283-286. ACM, (2005)Homomorphic Encryption Based on Group Algebras and Goldwasser-Micali Scheme., , and . SECITC, volume 10006 of Lecture Notes in Computer Science, page 149-166. (2016)