Author of the publication

Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality.

, , , and . Financial Cryptography Workshops, volume 8976 of Lecture Notes in Computer Science, page 261-273. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Requirements for Future ERP systems, and . Proceedings of the 30th Information Systems Research Seminar in Scandinavia - IRIS 30, page 467-480. (2007)ERP systems implementation: Factors influencing selection of a specific approach?, and . 3gERP workshop, Frederiksberg, Denmark, (2008)Low Level Operations and Learning in Computer Vision.. Linköping University, Sweden, (2004)base-search.net (ftlinkoepinguniv:oai:DiVA.org:liu-24005).Offshore Outsourcing: An IT-Manager Perspective on Cultural Differences., and . BIR Workshops, volume 2443 of CEUR Workshop Proceedings, page 140-152. CEUR-WS.org, (2019)Automation as Migration? - identifying Factors Influencing Adoption of RPA in Local Government., , and . ECIS, (2021)Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters., , , and . CDC, page 1990-1995. IEEE, (2006)Distributed non-smooth resource allocation over a network., and . CDC, page 1678-1683. IEEE, (2009)Introducing simulation across the disciplines., , , and . WSC, page 2274-2279. IEEE Computer Society, (2005)Supply chain carbon footprint tradeoffs using simulation., , and . WSC, page 279:1-279:12. WSC, (2012)A VSM approach to support data collection for a simulation model., , , , , and . WSC, page 3928-3939. IEEE, (2017)