Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trustworthy and effective person-to-person payments over multi-hop MANETs., , and . J. Network and Computer Applications, (2016)New Approach to Quantification of Privacy on Social Network Sites., , , and . AINA, page 556-564. IEEE Computer Society, (2010)A Security-Aware Access Model for Data-Driven EHR System., , , and . CoRR, (2019)An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network., , , and . CoRR, (2018)Enforcing Trust Preferences in Mobile Person-to-Person Payments., , and . SocialCom, page 429-434. IEEE Computer Society, (2013)A Privacy-Preserving Framework for Constrained Choreographed Service Composition., , and . ICWS, page 297-304. IEEE Computer Society, (2015)Privacy Preserving Decentralized Identity Validation for Geo-social Networks over MANET., , , and . HOTPOST@MobiHoc, page 7-12. ACM, (2015)Secure Web Service Composition with Untrusted Broker., , and . ICWS, page 137-144. IEEE Computer Society, (2014)Measuring Accumulated Revelations of Private Information by Multiple Media., , , and . I3E, volume 341 of IFIP Advances in Information and Communication Technology, page 70-80. Springer, (2010)Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network., , , and . IIH-MSP, page 506-509. IEEE Computer Society, (2010)