|
2013 |
D. Abu-Saymeh, DeDI Abou-Tair, A. Zmily,"An Application Security Framework for Near Field Communication",IEEE International Conference on Trust, Security and Privacy in Computing and Communications,Melbourne, Australia, 16-18 July, 2013,2013 |
|
2013 |
Dhiah el Diehn I. Abou-Tair, M. Bourimi, R. Tesoriero, D. Kesdgoan, M. Heupel. B. Ueberschaer,"An end-user tailorable generic framework for privacy-preserving location-based mobile applications",Journal of Applied Mathematics & Information Sciences. ,Volume 7, No. 6 , PP:2137-2148,2013 |
|
2013 |
A. Zmily, D. Abu-Saymeh, DeDI Abou-Tair,"Identity Hopping Based Security Framework for Social Media Applications",International Conference on Soft Computing and Software Engineering,San Francisco, USA,2013 |
|
2013 |
Dirar Abu-Saymeh, Dhiah el Diehn I. Abou-Tair, and Ahmad Zmily,"An application security framework for near field communication",12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on ,Melbourne, Australia,2013 |
|
2013 |
Dr. Ismail Hababeh, Dr. Issa Khalil, Dr. Abdallah Khreishah, Dr. Samir Bataineh,"Promoting Wormhole Security Approaches For Ad-Hoc Networks",Proceedings of the International Conference on Computational & Network Technologies,December 2-4,Adelaide, South Australia, Australia,2013 |
|
2013 |
DeDI Abou-Tair, M. Bourimi, R. Tesoriero, D. Kesdgoan, M. Heupel, B. Ueberschaer ,"An end-user tailorable generic framework for privacy-preserving location-based mobile applications",Journal of Applied Mathematics & Information Sciences,Vol 7, PP:2137-2148,2013 |
|
2013 |
Dr. Ismail Hababeh, Dr. Issa Khalil, Dr. Abdallah Khreishah, Dr. Samir Bataineh,"Performance Evaluation Of Wormhole Security Approaches For Ad-Hoc Networks",Journal of Computer Science,Vol 9, no 12, pp. 1626-1637,2013 |
|
2013 |
M. Bourimi, D. Kesdogan, M. Heupel, DeDI Abou-Tair, N. Lambropoulos ,"PETs at CSCL Service: Underutilised Potentials for Privacy-Enhancing Distance Education",Journal of Universal Computer Science,Vol. 19, No. 7. PP:912-931,2013 |
|
2012 |
M. Bourimi, T. Barth, D. Kesdogan, DeDI Abou-Tair, F. Hermann, S. Thiel,"Using distributed user interfaces in collaborative, secure and privacy-preserving software environments",International Journal of Human-Computer Interaction ,28(11), 748-753,2012 |
|
2012 |
C. Class,"Bridging Cultural Differences in Teaching Computer Ethics - An Example Using Personal Portfolios",SIGCAS Computers and Society,Vol. 42, No. 2,2012 |
|
2012 |
D. Weber-Wulff, C. Class,"Wie würden Sie urteilen? Fallbeispiel Pseudokonferenz?",Informatik Spektrum,Vol. 35, No. 5,2012 |
|
2012 |
Ahmed Muhaidat, Mohammad Al-Addous, Firas Alawneh, and Christina B. Class,"A Photovoltaic System for Small Scale Brackish Water Desalination in Remote Areas",In International Conference on Solar energy for MENA region (INCOSOL),2012 |
|
2012 |
D. Weber-Wulff, C. Class,"Gewissensbits – Wie würden Sie urteilen? Fallbeispiel Planungen",Informatik Spektrum,Vol. 35, No. 3,2012 |
|
2012 |
M. Bourimi M, Barth T, D. Kesdogan, Dhiah el Diehn I. Abou-Tair, F. Hermann, S. Thiel,"Using distributed user interfaces in collaborative, secure and privacy-preserving software environments",International Journal of Human-Computer Interaction 28(11), 748-753,2012 |
|
2012 |
DeD I. Abou-Tair, M. Bourimi, R. Tesoriero, D. Kesdogan, M. Heupel,"A generic location-based mobile application framework supporting privacy-preserving end-user tailorability",International Confernce on Future Generation Communication,London, UK,2012 |