Author of the publication

A Client-Server Approach to Capture Web Browsing History.

, and . Security and Management, page 357-362. CSREA Press, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kresman, Ray
add a person with the name Kresman, Ray
 

Other publications of authors with the same name

A Client-Server Approach to Capture Web Browsing History., and . Security and Management, page 357-362. CSREA Press, (2008)Cryptographic Features, Applications: Java (C).. ICSOFT (PL/DPS/KE), page 5. INSTICC Press, (2008)A Heuristic Algorithm for Finding Edge Disjoint Cycles in Graphs., and . ICSOFT (Selected Papers), volume 170 of Communications in Computer and Information Science, page 191-202. Springer, (2010)Privacy Preserving Data Sharing With Anonymous ID Assignment., and . IEEE Trans. Information Forensics and Security, 8 (2): 402-413 (2013)Indirect Disclosures in Data Mining., and . FCST, page 346-350. IEEE Computer Society, (2009)Notes on Privacy-preserving Distributed Mining and Hamiltonian Cycles., and . ICSOFT (1), page 103-107. SciTePress, (2010)Trust Enabled Secure Multiparty Computation., and . IV, page 531-536. IEEE Computer Society, (2010)On Privacy Preserving Encrypted Data Stores., , and . MUE, volume 240 of Lecture Notes in Electrical Engineering, page 219-226. Springer, (2013)Tuition Raffle System: A Capstone Research Project., , and . FECS, page 82-87. CSREA Press, (2007)On Petri Nets and Predicate-Transition Nets., and . Software Engineering Research and Practice, page 903-909. CSREA Press, (2006)