Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy/performance trade-off in private search on bio-medical data., , , and . Future Generation Comp. Syst., (2014)A digital file inventory of the Queens College Special Collections and Archives: Findings, analysis and recommendations for long-term preservation., , , , and . OCLC Systems & Services, 30 (2): 78-90 (2014)Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques., , , and . J. Parallel Distrib. Comput., 66 (9): 1189-1204 (2006)Hidden messages: evaluating the efficiency of code elision in program navigation., and . Interacting with Computers, 15 (3): 387-407 (2003)Composition and Execution of Secure Workflows in WSRF-Grids., , and . CCGRID, page 122-129. IEEE Computer Society, (2008)A Robust Business Resource Management Framework Based on a Peer-to-Peer Infrastructure., , , and . CEC, page 215-222. IEEE Computer Society, (2005)Security for service-oriented on-demand grid computing.. University of Marburg, (2008)An identity-based security infrastructure for Cloud environments., , , , and . WCNIS, page 644-649. IEEE, (2010)No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations., , , and . NDSS, The Internet Society, (2015)An Empirical Study of Textual Key-Fingerprint Representations., , , , , and . USENIX Security Symposium, page 193-208. USENIX Association, (2016)