Author of the publication

Privacy in E-learning: How to implement anonymity.

, and . AICCSA, page 840-846. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel mediator architectures for Grid information systems., , and . Future Generation Comp. Syst., 21 (1): 107-114 (2005)Modelling Data Secrecy and Integrity., , and . Data Knowl. Eng., 26 (3): 291-308 (1998)Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten., , , and . Elektrotechnik und Informationstechnik, 127 (5): 135-142 (2010)The Grid: vision, technology development and applications., , and . Elektrotechnik und Informationstechnik, 123 (6): 251-258 (2006)Towards Service Collaboration Model in Grid-based Zero Latency Data Stream Warehouse (GZLDSWH)., , , and . IEEE SCC, page 357-365. IEEE Computer Society, (2004)The Contribution of Information and Communication Technologies for the Innovation of Health Care Processes.. EuroPACS, volume 144 of books@ocg.at, page 38. Austrian Computer Society, (2000)Mapping Temporal Data Warehouse Concepts., and . ICEIS (1), page 391-397. (2005)Advanced technologies for homeland defense and security., , , and . J. Network and Computer Applications, (2014)A Framework for Efficient Association Rule Mining in XML Data., , , , and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)State of art and open issues on graphical user interfaces for object-oriented database systems., and . Information & Software Technology, 34 (11): 721-730 (1992)