Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XQuery meets Datalog: Data Relevance Query for workflow trustworthiness.. RCIS, page 169-174. IEEE, (2010)A Framework for Delivering Rigorously Trusted Services., and . ICWS, page 648-651. IEEE Computer Society, (2010)Semantic based aspect-oriented programming for context-aware Web service composition., , and . Inf. Syst., 36 (3): 551-564 (2011)Privacy Preserving User Based Web Service Recommendations., , , , , and . IEEE Access, (2018)A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT., , , , , and . CoRR, (2019)Privacy Preserving Location Recommendations., , , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 502-516. Springer, (2017)GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search., , , , , and . AsiaCCS, page 41-54. ACM, (2019)A Web Service Architecture for Bidirectional XML Updating., , , , , and . APWeb/WAIM, volume 4505 of Lecture Notes in Computer Science, page 721-732. Springer, (2007)Risk of Asynchronous Protocol Update: Attacks to Monero Protocols., , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 307-321. Springer, (2019)An Intelligent Intruder Model for Security Protocol Analysis., , and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 13-22. Springer, (2001)