Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: Lessons Learned from SSL/TLS Attacks., and . WISA, volume 8267 of Lecture Notes in Computer Science, page 189-209. Springer, (2013)Blur: The speed of change in the connected economy, and . Addison-Wesley, Reading, MA, (1998)The Global Genome Biodiversity Network (GGBN) Data Standard specification., , , , , , , , , and 25 other author(s). Database J. Biol. Databases Curation, (2016)Transfer Learning for Mortality Prediction in Non-Small Cell Lung Cancer with Low-Resolution Histopathology Slide Snapshots., , , , , , , , , and 2 other author(s). MedInfo, volume 310 of Studies in Health Technology and Informatics, page 735-739. IOS Press, (2023)Internet of Samples., , , , , , , , , and 7 other author(s). ASIST, volume 58 of Proc. Assoc. Inf. Sci. Technol., page 813-815. Wiley, (2021)Exploring Aural Navigation by Screenless Access., , , and . W4A, page 27:1-27:10. ACM, (2018)BigTop: a three-dimensional virtual reality tool for GWAS visualization., , and . BMC Bioinform., 21 (1): 39 (2020)Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses., and . IACR Cryptology ePrint Archive, (2013)Randomly Failed! The State of Randomness in Current Java Implementations., , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 129-144. Springer, (2013)An introduction to complexity and business.. Complex., 3 (4): 21-22 (1998)