From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Functional Requirements for a Secure Electronic Voting System., , , , и . SEC, том 214 из IFIP Conference Proceedings, стр. 507-520. Kluwer, (2002)An Ontology-Driven antiSPIT Architecture., и . e-Democracy, том 26 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 189-198. Springer, (2009)In Cloud We Trust: Risk-Assessment-as-a-Service., , и . IFIPTM, том 401 из IFIP Advances in Information and Communication Technology, стр. 100-110. Springer, (2013)ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information., , и . Comput. Commun., 26 (16): 1851-1862 (2003)The Insider Threat in Cloud Computing., , и . CRITIS, том 6983 из Lecture Notes in Computer Science, стр. 93-103. Springer, (2011)Assessing Privacy Risks in Android: A User-Centric Approach., , и . RISK@ICTSS, том 8418 из Lecture Notes in Computer Science, стр. 21-37. Springer, (2013)A Generic Privacy Enhancing Technology for Pervasive Computing Environments., , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 103-113. Springer, (2006)Towards Indeterminacy-Tolerant Access Control in IoT., , , и . Handbook of Big Data and IoT Security, Springer, (2019)Towards a formal system-to-system authentication protocol., и . Comput. Commun., 19 (12): 954-961 (1996)Editorial., , , , , , и . Comput. Secur., (2014)