From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IntentAuth: Securing Android's Intent-based inter-process communication., , и . Int. J. Inf. Sec., 21 (5): 973-982 (2022)The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud., , и . CoRR, (2022)Special Issue on Advanced Information Security for Secure and Trust Computing., , , и . Comput. Math. Appl., 65 (9): 1233 (2013)Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy.. Inf. Manag. Comput. Secur., 21 (3): 177-190 (2013)Special issue on next generation communication and network security., , и . Secur. Commun. Networks, 5 (10): 1083-1085 (2012)An ontology-based policy for deploying secure SIP-based VoIP services., , и . Comput. Secur., 27 (7-8): 285-297 (2008)Risk analysis of a patient monitoring system using Bayesian Network modeling., , , и . J. Biomed. Informatics, 39 (6): 637-647 (2006)IoT Forensics: Analysis of Ajax Systems' mobile app for the end user., и . CSR, стр. 446-451. IEEE, (2023)GDPR Compliance: Proposed Technical and Organizational Measures for Cloud Providers., , и . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, том 11980 из Lecture Notes in Computer Science, стр. 181-194. Springer, (2019)ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence., , и . TrustBus, том 8058 из Lecture Notes in Computer Science, стр. 137-148. Springer, (2013)