Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Confidentiality using Fragmentation in Cloud Computing., , , , and . Int. J. Pervasive Computing and Communications, (2013)A tamper-proof audit and control system for the doctor in the loop., , , , and . Brain Informatics, 3 (4): 269-279 (2016)QR Code Security: A Survey of Attacks and Challenges for Usable Security., , , , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 79-90. Springer, (2014)Protecting Anonymity in Data-Driven Biomedical Science., , , , and . Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, volume 8401 of Lecture Notes in Computer Science, Springer, (2014)Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI., , , and . CD-MAKE, volume 11015 of Lecture Notes in Computer Science, page 1-8. Springer, (2018)Machine Learning and Knowledge Extraction in Digital Pathology Needs an Integrative Approach., , , , , , and . BIRS-IMLKE, volume 10344 of Lecture Notes in Computer Science, page 13-50. Springer, (2015)Using Internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding., , and . IFIP Int. Conf. Digital Forensics, volume 462 of IFIP Advances in Information and Communication Technology, page 179-194. Springer, (2015)Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters., , , , and . ARES, page 645-649. IEEE Computer Society, (2011)Forensics using Internal Database Structures., , and . ERCIM News, (2017)Security Testing for Mobile Applications., , and . ERCIM News, (2017)