Author of the publication

Robust XML Watermarking Using Fuzzy Queries.

, , and . COMPSAC Workshops, page 433-438. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test., , and . CAiSE Workshops, volume 148 of Lecture Notes in Business Information Processing, page 466-477. Springer, (2013)K-Means Clustering in Dual Space for Unsupervised Feature Partitioning in Multi-view Learning., , and . SITIS, page 1-8. IEEE, (2018)Human-centered e-business., , and . Kluwer, (2003)Big Data and Data Analytics Research: From Metaphors to Value Space for Collective Wisdom in Human Decision Making and Smart Machines., , and . Int. J. Semantic Web Inf. Syst., 13 (1): 1-10 (2017)Managing and Sharing Servents' Reputations in P2P Systems., , , and . IEEE Trans. Knowl. Data Eng., 15 (4): 840-854 (2003)A Non-invasive Method for the Conformance Assessment of Pair Programming Practices Based on Hierarchical Hidden Markov Models., and . XP, volume 4536 of Lecture Notes in Computer Science, page 123-136. Springer, (2007)Navigation Dynamics as a Biometrics for Authentication., and . KES (2), volume 4693 of Lecture Notes in Computer Science, page 832-839. Springer, (2007)Fuzzy Techniques for XML Data Smushing., , and . Fuzzy Days, volume 2206 of Lecture Notes in Computer Science, page 637-652. Springer, (2001)A Knowledge-Based IoT Security Checker., , , , , and . Euro-Par Workshops, volume 11339 of Lecture Notes in Computer Science, page 299-311. Springer, (2018)AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing., , , , and . DPM/SETOP, volume 7731 of Lecture Notes in Computer Science, page 201-216. Springer, (2012)