Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specifying Privacy-Preserving Protocols in Typed MSR., , and . Comput. Stand. Interfaces, 27 (5): 501-512 (2005)Specifying and implementing privacy-preserving cryptographic protocols. University of the Aegean, Greece, (2008)National Archive of PhD Theses: oai:10442/26092.Specifying electronic voting protocols in typed MSR., , and . WPES, page 35-39. ACM, (2005)Incorporating Security Requirements Into the Software Development Process., , , , , and . ECIW, page 21-28. Academic Conferences Limited, Reading, UK, (2005)An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder., , and . Communications and Multimedia Security, volume 175 of IFIP, page 209-221. Springer, (2004)A Framework for Exploiting Security Expertise in Application Development., , , , , and . TrustBus, volume 4083 of Lecture Notes in Computer Science, page 62-70. Springer, (2006)Specifying and implementing privacy-preserving cryptographic protocols., , and . Int. J. Inf. Sec., 7 (6): 395-420 (2008)Employing Ontologies for the Development of Security Critical Applications., , , , , , and . I3E, volume 189 of IFIP, page 187-201. Springer, (2005)Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols., and . DEXA Workshops, page 396-401. IEEE Computer Society, (2003)An ontology for secure e-government applications., , , , , , and . ARES, page 1033-1037. IEEE Computer Society, (2006)