Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain Mutability: Challenges and Proposed Solutions., , , and . CoRR, (2019)Immutability and Decentralized Storage: An Analysis of Emerging Threats., , , and . IEEE Access, (2020)Towards secure Grid-enabled healthcare., , , and . Softw. Pract. Exp., 35 (9): 857-871 (2005)Delegated content erasure in IPFS., , , , and . Future Gener. Comput. Syst., (2020)A Secure Wrapper for OGSA-DAI., , , and . EGC, volume 3470 of Lecture Notes in Computer Science, page 485-494. Springer, (2005)Securing web services for deployment in health grids., , , and . Future Gener. Comput. Syst., 22 (5): 547-570 (2006)Backups and the right to be forgotten in the GDPR: An uneasy relationship., , , , and . Comput. Law Secur. Rev., 34 (6): 1247-1257 (2018)New ways in digitization and visualization of cultural objects., , , , , , and . DSP, page 475-478. IEEE, (2002)JPEG2000 and dissemination of cultural heritage over the Internet., , and . IEEE Trans. Image Processing, 13 (3): 293-301 (2004)Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions., , and . J. Cybersecur., 4 (1): tyy001 (2018)