Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Architecture Evaluation through Ontology-Based Requirements-Level Scenarios., , , , and . WADS, volume 5135 of Lecture Notes in Computer Science, page 225-247. Springer, (2007)Indexing Encrypted Documents for Supporting Efficient Keyword Search., , , and . Secure Data Management, volume 7482 of Lecture Notes in Computer Science, page 93-110. Springer, (2012)Nomad: A Framework for Developing Mission-Critical Cloud-Based Applications., , , , , and . ARES, page 660-669. IEEE Computer Society, (2015)CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework., , , , , and . Financial Cryptography Workshops, volume 9604 of Lecture Notes in Computer Science, page 319-327. Springer, (2016)IoT Notary: Attestable Sensor Data Capture in IoT Environments., , , , , , and . CoRR, (2021)A Forensic Pattern-Based Approach for Investigations in Cloud System Environments., and . CSNet, page 1-8. IEEE, (2018)CloudProtect: Managing Data Privacy in Cloud Applications., , , , and . IEEE CLOUD, page 303-310. IEEE Computer Society, (2012)A privacy-enabled platform for COVID-19 applications: poster abstract., , , , , , , , , and 5 other author(s). SenSys, page 745-746. ACM, (2020)IoT Notary: Sensor Data Attestation in Smart Environment., , , , , , and . NCA, page 1-9. IEEE, (2019)Trustworthy Privacy Policy Translation in Untrusted IoT Environments., , , and . IoTBDS, page 132-143. SciTePress, (2018)