Author:
Kester Quist-Aphetsi,Pascu Anca Christine,Nana Laurent,Gire Sophie,Eghan Jojo M.,Quaynor Nii Narku
Publisher
Springer International Publishing
Reference13 articles.
1. Cameron, J.J., Leung, C.K.-S., Tanbeer, S.K.: Finding strong groups of friends among friends in social networks. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 824–831, December 12–14, 2011
2. Löhr, H., Sadeghi, A.-R., Winandy, M.: Securing the e-health cloud. In: Veinot, T. (ed.) Proceedings of the 1st ACM International Health Informatics Symposium (IHI 2010), pp. 220–229. ACM, New York (2010)
3. Kester, Q.-A., Nana, L., Pascu, A.C., Gire, S., Eghan, J.M., Quaynor, N.N.: Feature based encryption technique for securing forensic biometric image data using AES and visual cryptography (AIMS). In: 2014 IEEE International Conference on Artificial Intelligence, Modelling and Simulation, pp. 191–205. IEEE, November 2014
4. Zhang, C., Li, H., Guo, Q., Jia, J., Shen, I.F.: Fast Active Tabu Search and its Application to Image Retrieval. IJCAI 9, 1333–1338 (2009)
5. Tonella, P.: Formal concept analysis in software engineering. In: Proceedings of 26th International Conference on Software Engineering, ICSE 2004, pp. 743–744, May 23–28, 2004