Author of the publication

Spam Filtering with Cryptographic Ad-hoc E-mail Addresses.

, , , and . SAINT Workshops, page 114-117. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applicability of existing anonymization methods to large location history data in urban travel., , , , , , and . SMC, page 997-1004. IEEE, (2012)Vision-Proposal Design Method., , , , , and . HCI (16), volume 6776 of Lecture Notes in Computer Science, page 166-174. Springer, (2011)Collection Shop and Service Information with Software Agents., , , and . PAAM, page 587-596. Practical Application Company Ltd., (1996)Zipf distribution model for quantifying risk of re-identification from trajectory data., and . PST, page 14-21. IEEE Computer Society, (2015)Analytical Comparison Between the Pattern Classifiers Based upon a Multilayered Perceptron and Probabilistic Neural Network in Parallel Implementation., , and . ICANN (3), volume 13531 of Lecture Notes in Computer Science, page 544-555. Springer, (2022)Kokono Search: A Location Based Search Engine., , and . WWW Posters, (2001)Intelligent Pages Collecting Shop and Service Information with Software Agents., , , and . Appl. Artif. Intell., 11 (6): 489-499 (1997)Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms., , , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 202-216. Springer, (2012)Structured Scenario-Based Design Method., , , , , and . HCI (10), volume 5619 of Lecture Notes in Computer Science, page 374-380. Springer, (2009)Proposal for Experience Vision., , , , , and . HCI (1), volume 8004 of Lecture Notes in Computer Science, page 137-145. Springer, (2013)