Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending Independent Component Analysis for Event Detection on Online Social Media., and . IDEAL (1), volume 11314 of Lecture Notes in Computer Science, page 792-800. Springer, (2018)Challenges in data integration and interoperability in geovisual analytics., , , , , , and . J. Location Based Services, 5 (1): 58 (2011)Rational authentication protocols and their use in financial transactions.. IACR Cryptology ePrint Archive, (2012)Rational authentication protocols.. IACR Cryptology ePrint Archive, (2011)The Missing Link: Human Interactive Security Protocols in Mobile Payment., , , and . IWSEC (Short Papers), page 94-109. Information Processing Society of Japan (IPSJ), (2010)SocioScope: an Integrated Framework for Understanding Society from Social Data., , , , , and . JIST (Workshops & Posters), volume 2000 of CEUR Workshop Proceedings, page 69-76. CEUR-WS.org, (2017)Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication., and . FSE, volume 7549 of Lecture Notes in Computer Science, page 326-345. Springer, (2012)Towards Social Signal Separation Based on Reconstruction Independent Component Analysis., , , , and . IDCS, volume 11226 of Lecture Notes in Computer Science, page 185-196. Springer, (2018)Spatial-Temporal Multi-Task Learning for Within-Field Cotton Yield Prediction., , , , , , and . PAKDD (1), volume 11439 of Lecture Notes in Computer Science, page 343-354. Springer, (2019)Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey., and . IACR Cryptology ePrint Archive, (2010)