Author of the publication

Ontology Enrichment Based on the Mapping of Knowledge Resources for Data Privacy Management.

, , , , and . ONTOBRAS-MOST, volume 776 of CEUR Workshop Proceedings, page 85-96. CEUR-WS.org, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sander, Tomas
add a person with the name Sander, Tomas
 

Other publications of authors with the same name

Deciding Properties of Polynomials Without Factoring., and . FOCS, page 46-55. IEEE Computer Society, (1997)On Software Protection via Function Hiding., and . Information Hiding, volume 1525 of Lecture Notes in Computer Science, page 111-123. Springer, (1998)Ontology Enrichment Based on the Mapping of Knowledge Resources for Data Privacy Management., , , , and . ONTOBRAS-MOST, volume 776 of CEUR Workshop Proceedings, page 85-96. CEUR-WS.org, (2011)Private Projections & Variants., , , and . IACR Cryptology ePrint Archive, (2016)Golden Times for Digital Rights Management?. Financial Cryptography, volume 2339 of Lecture Notes in Computer Science, page 55-65. Springer, (2001)Blind, Auditable Membership Proofs., , and . Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, page 53-71. Springer, (2000)WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security., , and . ACM Conference on Computer and Communications Security, page 1877-1878. ACM, (2016)WISCS 2014: The First ACM Workshop on Information Sharing & Collaborative Security.. ACM Conference on Computer and Communications Security, page 1552-1553. ACM, (2014)Private Set Projections & Variants., , , and . WPES@CCS, page 87-98. ACM, (2017)Privacy Management for Global Organizations., , and . DPM/SETOP, volume 5939 of Lecture Notes in Computer Science, page 9-17. Springer, (2009)