Author of the publication

High-Assurance Integrity Techniques for Databases.

, , , and . BNCOD, volume 5071 of Lecture Notes in Computer Science, page 244-256. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Moving Queries over Moving Object Data Streams., , and . DASFAA, volume 4443 of Lecture Notes in Computer Science, page 563-575. Springer, (2007)Bigger Than We Thought: The Upbit Hack Gang., , and . MARBLE, page 178-185. Springer, (2023)MELT: Mapreduce-based Efficient Large-scale Trajectory Anonymization., , and . SSDBM, page 35:1-35:6. ACM, (2017)High-Assurance Integrity Techniques for Databases., , , and . BNCOD, volume 5071 of Lecture Notes in Computer Science, page 244-256. Springer, (2008)Location Privacy Policy Management System., , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 427-434. Springer, (2012)Faster FAST: multicore acceleration of streaming financial data., , , , , , and . Comput. Sci. Res. Dev., 23 (3-4): 249-257 (2009)A Security Enhanced AODV Routing Protocol., , , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 298-307. Springer, (2005)Financial Crimes in Web3-Empowered Metaverse: Taxonomy, Countermeasures, and Opportunities., , , , , and . IEEE Open J. Comput. Soc., (2023)Modeling and Understanding Ethereum Transaction Records via a Complex Network Approach., , , and . CoRR, (2020)T-EDGE: Temporal WEighted MultiDiGraph Embedding for Ethereum Transaction Network Analysis., , , and . CoRR, (2019)