Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Future of Enterprise Groupware Applications., , , , and . ICEIS, page 525-532. (1999)Investigating Mobile Instant Messaging Phishing: A Study into User Awareness and Preventive Measures., , and . HCI (35), volume 14045 of Lecture Notes in Computer Science, page 381-398. Springer, (2023)The Virtues Architecture: A Software Infrastructure for Business-to-Business E-Commerce., , , , and . ICEIS, page 461-466. (2000)A Management Architecture for Measuring and Monitoring the Behavior of Digital Libraries., , and . ECDL, volume 1513 of Lecture Notes in Computer Science, page 95-114. Springer, (1998)Efficient Delegated Private Set Intersection on Outsourced Private Datasets., , , and . IEEE Trans. Dependable Secur. Comput., 16 (4): 608-624 (2019)A Middleware for Pervasive Situation-Awareness., and . DAIS, volume 7272 of Lecture Notes in Computer Science, page 148-161. Springer, (2012)Middleware for pervasive and ad hoc computing., , , and . Personal and Ubiquitous Computing, 10 (1): 4-6 (2006)Towards self-protecting ubiquitous systems: monitoring trust-based interactions., , and . Personal and Ubiquitous Computing, 10 (1): 50-54 (2006)Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links., and . HAISA, volume 658 of IFIP Advances in Information and Communication Technology, page 197-206. Springer, (2022)A model and architecture for situation determination., , and . CASCON, page 380. IBM, (2006)