Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tour in the Archaeological Site of Choirokoitia Using Virtual Reality: A Learning Performance and Interest Generation Assessment., , , , , , and . DCH@ICE/ITMC, volume 10754 of Lecture Notes in Computer Science, page 208-217. Springer, (2017)Intuitive interaction for exploring human anatomy in a VR setup., , and . VSMM, page 1-4. IEEE, (2017)Flexible Transparency: A Privacy Enabler in Blockchain Technologies., and . ERCIM News, (2017)Virtual environments design assessment for the treatment of claustrophobia., and . VSMM, page 1-8. IEEE, (2016)Virtual reality for inducing empathy and reducing prejudice towards stigmatized groups: A survey., and . VSMM, page 1-8. IEEE, (2017)Studying Levels of Presence in a Virtual Environment Simulating Drug Use in Schools: Effect on Different Character Perspectives., , , , , and . ICAT-EGVE, page 163-170. Eurographics Association, (2018)Towards ERP success in SMEs through business process review prior to implementation., , , and . J. Systems and IT, 15 (4): 304-323 (2013)Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol., and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 299-314. Springer, (2012)DoSE: Deobfuscation based on Semantic Equivalence., , , and . SSPREW@ACSAC, page 1:1-1:12. ACM, (2018)Formal verification of a CRT-RSA implementation against fault attacks., , , and . J. Cryptographic Engineering, 3 (3): 157-167 (2013)