Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph Searching on Some Subclasses of Chordal Graphs., , , , and . Algorithmica, 27 (3): 395-426 (2000)A Unifying Augmentation Algorithm for Two-Edge Connectivity and Biconnectivity., and . J. Comb. Optim., 2 (3): 237-256 (1998)On The Damage and Compensation of Privacy Leakage., , , and . DBSec, volume 144 of IFIP, page 311-324. Kluwer/Springer, (2004)Efficient implementation of virtual processing for some combinatorial algorithms on the MasPar MP-1., and . SPDP, page 154-159. IEEE, (1995)An Information-Theoretic Approach for Secure Protocol Composition., , , , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 405-423. Springer, (2014)Prolong Lifetime of Dynamic Sensor Network by an Intelligent Wireless Charging Vehicle., , , , , , and . VTC Fall, page 1-5. IEEE, (2015)Privacy-Preserving Collaborative Recommender Systems., , , , , and . IEEE Trans. Systems, Man, and Cybernetics, Part C, 40 (4): 472-476 (2010)Toward Empirical Aspects of Secure Scalar Product., , , , , and . IEEE Trans. Systems, Man, and Cybernetics, Part C, 39 (4): 440-447 (2009)Granulation as a Privacy Protection Mechanism., , and . Trans. Rough Sets, (2007)A QoS-Aware Data Reconstruction Strategy for a Data Fault-Tolerant Storage System., , , , , , , and . CloudCom, page 274-281. IEEE Computer Society, (2015)