Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A formal methodology for integral security design and verification of network protocols, , and . CoRR, (2012)libgroupsig: An extensible C library for group signatures., , and . IACR Cryptology ePrint Archive, (2015)Methodological Security Verification of a Registration Protocol., , and . SOCO-CISIS-ICEUTE, volume 299 of Advances in Intelligent Systems and Computing, page 453-462. Springer, (2014)Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers., , , and . Computer and Network Security Essentials, Springer, (2018)Robust dynamical invariants in sequential neural activity, , , , and . Scientific reports, 9 (1): 1--13 (2019)On the application of compression-based metrics to identifying anomalous behaviour in web traffic, , and . Logic Journal of the IGPL, (2020)Trustworthy humans and machines: Vulnerable trustors and the need for trustees' competence, integrity, and benevolence in digital systems, and . Trust and Transparency in an Age of Surveillance, Lora Anne Viola and Paweł Laidler (Eds.), Routledge, (2022)TRESCA D1.3 Report with elaborated focus area description and trending topic analysis, , , , , , and . (2020)Review of the main security threats and challenges in free-access public cloud storage servers, , , and . Computer and Network Security Essentials, Springer, Cham, (2018)Operating with external arguments of Douady and Hubbard, , , , , and . Discrete Dynamics in Nature and Society, (2007)