Author of the publication

Is the world ready or do we need more tools for programming related teamwork?

, , , and . Koli Calling, page 33-39. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Representation Model of Trust Relationships with Delegation Extensions., , and . iTrust, volume 3477 of Lecture Notes in Computer Science, page 116-130. Springer, (2005)A Blockchain Approach for Decentralized V2X (D-V2X)., , and . IEEE Trans. Veh. Technol., 70 (5): 4001-4010 (2021)NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU., , and . AsiaCCS, page 179-189. ACM, (2015)Escrowed decryption protocols for lawful interception of encrypted data., , and . IET Inf. Secur., 13 (5): 498-507 (2019)Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services., , and . CloudCom, page 241-248. IEEE Computer Society, (2012)Security assurance during the software development cycle., , and . CompSysTech, page 20. ACM, (2009)A Task Ordering Approach for Automatic Trust Establishment., , , and . ESSoS, volume 7159 of Lecture Notes in Computer Science, page 75-88. Springer, (2012)Secure Real-Time Integration of Services in a OSGi Distributed Environment., , and . NCM (1), page 631-635. IEEE Computer Society, (2008)Integration of MPC into Besu through an extended private transaction model., , and . MetaCom, page 266-273. IEEE, (2023)A Parametric Family of Attack Models for Proxy Re-encryption., , and . CSF, page 290-301. IEEE Computer Society, (2015)