From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improved Identity Management with Verifiable Credentials and FIDO., , , , , и . IEEE Commun. Stand. Mag., 3 (4): 14-20 (2019)A cloud-based architecture for mitigating privacy issues in online social networks., , , , и . Int. Arab J. Inf. Technol., 16 (5): 879-888 (2019)Attribute-Based Mining Process for the Organization-Based Access Control Model., , , и . TrustCom/ISPA/IUCC, стр. 421-430. IEEE Computer Society, (2013)Authentication in Virtual Organizations: A Reputation Based PKI Interconnection Model., , , и . SVM, том 18 из Communications in Computer and Information Science, стр. 84-95. (2008)How to Design and Deliver Courses for Higher Education in the AI Era: Insights from Exam Data Analysis., , , , и . CoRR, (2023)PKI Interoperability: Still an Issue? A Solution in the X.509 Realm., , , , и . World Conference on Information Security Education, том 406 из IFIP Advances in Information and Communication Technology, стр. 68-82. Springer, (2013)How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches., , , , и . LCN, стр. 531-534. IEEE Computer Society, (2016)Know Your Customer: Opening a new bank account online using UAAF., , , , , , и . CCNC, стр. 1-2. IEEE, (2020)Logic-based methodology to help security architects in eliciting high-level network security requirements., , , , и . SAC, стр. 1610-1619. ACM, (2019)Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies., , , , и . SAC, стр. 1316-1318. ACM, (2018)