Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3-D Virtual Worlds and Higher Education., , and . AMCIS, page 734. Association for Information Systems, (2009)3-d Virtual World Education: an Empirical Comparison with Face-to-Face Classroom., , and . ICIS, page 260. Association for Information Systems, (2010)DCCA-Secure Public-Key Encryptions from Hybrid Paradigms., , and . INCoS, page 264-269. IEEE, (2012)V-MLR: A Multilevel Security Model for Virtualization., , , , , and . INCoS, page 9-16. IEEE, (2013)Adoption of 3-D Virtual Worlds for Education., , and . ICIS, page 113. Association for Information Systems, (2008)Secure Approximate Nearest Neighbor Search over Encrypted Data., , , and . BWCCA, page 578-583. IEEE Computer Society, (2014)Request-Based Comparable Encryption Scheme with Multiple Users., , , and . BWCCA, page 414-416. IEEE Computer Society, (2015)Efficient First-Price Sealed-Bid Auction Protocols from Modified Comparable Encryption., , and . BWCCA, page 417-421. IEEE Computer Society, (2015)Basic Properties of Calcium Phosphate Cement Containing Chitosan in its Liquid Phase., , , and . BMEI, page 1-3. IEEE, (2009)An Improved Algorithm for Secure Outsourcing of Modular Exponentiations., , and . AINA Workshops, page 73-76. IEEE Computer Society, (2015)