Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RDF Data Analysis with Activation Patterns, and . 10th International Conference on Knowledge Management and Knowledge Technologies 1–3 September 2010, Messe Congress Graz, Austria, page 18 - 18. (2010)User Tracking Based on Behavioral Fingerprints., , and . CANS, volume 6467 of Lecture Notes in Computer Science, page 76-95. Springer, (2010)iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments., , , and . SECRYPT, page 170-182. SciTePress, (2013)Android encryption systems., , , , , and . PRISMS, page 1-8. IEEE, (2014)CrySIL: Bringing Crypto to the Modern User., , and . WEBIST (Revised Selected Papers), volume 246 of Lecture Notes in Business Information Processing, page 70-90. Springer, (2015)In Certificates We Trust - Revisited., , and . TrustCom/BigDataSE/ISPA (1), page 702-709. IEEE, (2015)WebCrySIL - Web Cryptographic Service Interoperability Layer., , and . WEBIST, page 35-44. SciTePress, (2015)Massive Data Mining for Polymorphic Code Detection., , , and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 448-453. Springer, (2005)Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe., and . EGOVIS, volume 9265 of Lecture Notes in Computer Science, page 86-100. Springer, (2015)Secure and Privacy-Preserving Proxy Voting System., , and . ICEBE, page 472-477. IEEE Computer Society, (2013)