default search action
Milan Petkovic
- > Home > Persons > Milan Petkovic
Publications
- 2014
- [e11]Willem Jonker, Milan Petkovic:
Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings. Lecture Notes in Computer Science 8425, Springer 2014, ISBN 978-3-319-06810-7 [contents] - 2013
- [c42]Willem Jonker, Milan Petkovic:
Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler. Secure Data Management 2013: 54-58 - 2012
- [e10]Willem Jonker, Milan Petkovic:
Secure Data Management - 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings. Lecture Notes in Computer Science 7482, Springer 2012, ISBN 978-3-642-32872-5 [contents] - 2011
- [e9]Willem Jonker, Milan Petkovic:
Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings. Lecture Notes in Computer Science 6933, Springer 2011, ISBN 978-3-642-23555-9 [contents] - 2010
- [e8]Willem Jonker, Milan Petkovic:
Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings. Lecture Notes in Computer Science 6358, Springer 2010, ISBN 978-3-642-15545-1 [contents] - 2009
- [j4]Milan Petkovic, Willem Jonker:
Preface. J. Comput. Secur. 17(1): 1-3 (2009) - [c22]Luan Ibraimi, Milan Petkovic, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. WISA 2009: 309-323 - [e7]Willem Jonker, Milan Petkovic:
Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings. Lecture Notes in Computer Science 5776, Springer 2009, ISBN 978-3-642-04218-8 [contents] - 2008
- [j3]Anna Zych, Milan Petkovic, Willem Jonker:
Efficient key management for cryptographically enforced access control. Comput. Stand. Interfaces 30(6): 410-417 (2008) - [e6]Willem Jonker, Milan Petkovic:
Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings. Lecture Notes in Computer Science 5159, Springer 2008, ISBN 978-3-540-85258-2 [contents] - 2007
- [c17]Anna Zych, Milan Petkovic, Willem Jonker:
The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. DBSec 2007: 95-97 - [c15]Anna Zych, Milan Petkovic, Willem Jonker:
A Key Management Method for Cryptographically Enforced Access Control. WOSIS 2007: 9-22 - [p5]Milan Petkovic, Willem Jonker:
Privacy and Security Issues in a Digital World. Security, Privacy, and Trust in Modern Data Management 2007: 3-10 - [p4]Milan Petkovic, Willem Jonker, Henk M. Blanken:
A Spatio-Temporal and a Probabilistic Approach for Video Retrieval. Multimedia Retrieval 2007: 251-269 - [p3]Vojkan Mihajlovic, Milan Petkovic, Willem Jonker, Henk M. Blanken:
Multimodal Content-based Video Retrieval. Multimedia Retrieval 2007: 271-294 - [p1]Milan Petkovic, Claudine Conrado, Geert Jan Schrijen, Willem Jonker:
Enhancing Privacy for Digital Rights Management. Security, Privacy, and Trust in Modern Data Management 2007: 347-364 - [e5]Milan Petkovic, Willem Jonker:
Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications, Springer 2007, ISBN 978-3-540-69860-9 [contents] - [e4]Willem Jonker, Milan Petkovic:
Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings. Lecture Notes in Computer Science 4721, Springer 2007, ISBN 978-3-540-75247-9 [contents] - 2006
- [e3]Willem Jonker, Milan Petkovic:
Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings. Lecture Notes in Computer Science 4165, Springer 2006, ISBN 978-3-540-38984-2 [contents] - 2005
- [e2]Willem Jonker, Milan Petkovic:
Secure Data Management, Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005, Proceedings. Lecture Notes in Computer Science 3674, Springer 2005, ISBN 3-540-28798-1 [contents] - 2004
- [j1]Milan Petkovic, Willem Jonker:
Integrated use of different content derivation techniques within a multimedia database management system. J. Vis. Commun. Image Represent. 15(3): 303-329 (2004) - [c10]Claudine Conrado, Milan Petkovic, Willem Jonker:
Privacy-Preserving Digital Rights Management. Secure Data Management 2004: 83-99 - [e1]Willem Jonker, Milan Petkovic:
Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings. Lecture Notes in Computer Science 3178, Springer 2004, ISBN 3-540-22983-3 [contents] - 2003
- [b1]Milan Petkovic, Willem Jonker:
Content-Based Video Retrieval - A Database Perspective. Multimedia systems and applications 25, Springer 2003, ISBN 978-1-4419-5396-4, pp. I-X, 1-151 - [c9]Milan Petkovic, Vojkan Mihajlovic, Willem Jonker:
Techniques for automatic video content derivation. ICIP (2) 2003: 611-614 - 2002
- [c8]Milan Petkovic, Willem Jonker:
Cobra: A Content-Based Video Retrieval System. EDBT 2002: 736-738 - [c7]Milan Petkovic, Vojkan Mihajlovic, Willem Jonker:
Extending a DBMS to Support Content-Based Video Retrieval: A Formula 1 Case Study. EDBT Workshops 2002: 318-341 - [c6]Milan Petkovic, Roelof van Zwol, Henk Ernst Blok, Willem Jonker, Peter M. G. Apers, Menzo Windhouwer, Martin L. Kersten:
Content-Based Video Indexing for the Support of Digital Library Search. ICDE 2002: 494-495 - [c5]Milan Petkovic, Vojkan Mihajlovic, Willem Jonker, Slobodanka Djordjevic-Kajan:
Multi-modal extraction of highlights from TV Formula 1 programs. ICME (1) 2002: 817-820 - 2001
- [c4]Milan Petkovic, Willem Jonker:
Content-Based Video Retrieval by Integrating Spatio-Temporal and Stochastic Recognition of Events. IEEE Workshop on Detection and Recognition of Events in Video 2001: 75-82 - [c3]Milan Petkovic, Willem Jonker, Z. Zivkovic:
Recognizing Strokes in Tennis Videos using Hidden Markov Models. VIIP 2001: 512-516 - [c2]Henk Ernst Blok, Menzo Windhouwer, Roelof van Zwol, Milan Petkovic, Peter M. G. Apers, Martin L. Kersten, Willem Jonker:
Flexible and scalable digital library search. VLDB 2001: 705-706
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint