Follow
Anne Kayem
Anne Kayem
Hasso-Plattner-Institute
Verified email at mykayem.org - Homepage
Title
Cited by
Cited by
Year
Are motorways rational from slime mould's point of view?
A Adamatzky, S Akl, R Alonso-Sanz, W Van Dessel, Z Ibrahim, ...
International Journal of Parallel, Emergent and Distributed Systems 28 (3 …, 2013
372013
Adaptive cryptographic access control
AVDM Kayem, SG Akl, P Martin
Springer Science & Business Media, 2010
372010
A cyber risk based moving target defense mechanism for microservice architectures
KA Torkura, MIH Sukmana, AVDM Kayem, F Cheng, C Meinel
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
282018
Graphical Passwords--A Discussion
AVDM Kayem
2016 30th International Conference on Advanced Information Networking and …, 2016
252016
A usable and secure crime reporting system for technology resource constrained context
AB Sakpere, AVDM Kayem, T Ndlovu
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
182015
Adaptive cryptographic access control for dynamic data sharing environments
A Kayem, P Martin, SG Akl
Canadian theses, 2008
172008
Securing cloud storage brokerage systems through threat models
KA Torkura, MIH Sukmana, M Meinig, AVDM Kayem, F Cheng, ...
2018 IEEE 32nd international conference on advanced information networking …, 2018
162018
On replacing cryptographic keys in hierarchical key management systems
AVDM Kayem, SG Akl, P Martin
Journal of Computer Security 16 (3), 289-309, 2008
152008
A state-of-the-art review of data stream anonymization schemes
AB Sakpere, AVDM Kayem
Information security in diverse computing environments, 24-50, 2014
142014
A distributed continuous double auction framework for resource constrained microgrids
AMC Marufu, AVDM Kayem, SD Wolthusen
Critical Information Infrastructures Security: 10th International Conference …, 2016
132016
Secure and efficient mobile personal health data sharing in resource constrained environments
R Ssembatya, AVDM Kayem
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
132015
K-anonymity for privacy preserving crime data publishing in resource constrained environments
MJ Burke, AVDM Kayem
2014 28th International Conference on Advanced Information Networking and …, 2014
132014
A smart micro-grid architecture for resource constrained environments
AVDM Kayem, C Meinel, SD Wolthusen
2017 IEEE 31st International Conference on Advanced Information Networking …, 2017
122017
Decentralised scheduling of power consumption in micro-grids: Optimisation and security
GK Weldehawaryat, PL Ambassa, AMC Marufu, SD Wolthusen, ...
Security of Industrial Control Systems and Cyber-Physical Systems: Second …, 2017
122017
Key management for secure demand data communication in constrained micro-grids
AVDM Kayem, H Strauss, SD Wolthusen, C Meinel
2016 30th International Conference on Advanced Information Networking and …, 2016
122016
Automated k-Anonymization and l-Diversity for Shared Data Privacy
AVDM Kayem, CT Vester, C Meinel
Database and Expert Systems Applications: 27th International Conference …, 2016
122016
Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids
PL Ambassa, SD Wolthusen, AVDM Kayem, C Meinel
2015 IEEE Innovative Smart Grid Technologies-Asia (ISGT ASIA), 1-6, 2015
122015
Heuristics for improving cryptographic key assignment in a hierarchy
AVDM Kayem, P Martin, SG Akl
21st International Conference on Advanced Information Networking and …, 2007
112007
Attribute compartmentation and greedy UCC discovery for high-dimensional data anonymization
NJ Podlesny, AVDM Kayem, C Meinel
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
102019
Minimising information loss on anonymised high dimensional data with greedy in-memory processing
NJ Podlesny, AVDM Kayem, S von Schorlemer, M Uflacker
Database and Expert Systems Applications: 29th International Conference …, 2018
102018
The system can't perform the operation now. Try again later.
Articles 1–20