From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Approaches to Security in Healthcare Multimedia Systems., , , , и . Communications and Multimedia Security, том 70 из IFIP Conference Proceedings, стр. 25-36. Chapman & Hall, (1996)Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks., , , и . Conference on Information Security Management & Small Systems Security, том 200 из IFIP Conference Proceedings, стр. 87-98. Kluwer, (2001)Evaluating Consumer Understanding and Awareness of Connected and Autonomous Vehicle Data Privacy., и . ICISSP (Revised Selected Papers), том 1851 из Communications in Computer and Information Science, стр. 48-71. Springer, (2022)Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles., и . ICISSP, стр. 426-434. SCITEPRESS, (2022)Refining the Understanding of Usable Security., , и . HCI (35), том 14045 из Lecture Notes in Computer Science, стр. 49-67. Springer, (2023)Assessing User Understanding, Perception and Behaviour with Privacy and Permission Settings., , и . HCI (35), том 14045 из Lecture Notes in Computer Science, стр. 557-575. Springer, (2023)A National Certification Programme for Academic Degrees in Cyber Security., , , , , и . World Conference on Information Security Education, том 531 из IFIP Advances in Information and Communication Technology, стр. 133-145. Springer, (2018)Advanced user authentication for mobile devices., и . Comput. Secur., 26 (2): 109-119 (2007)Efficient Privacy-preserving User Identity with Purpose-based Encryption., , , и . ISNCC, стр. 1-8. IEEE, (2019)Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers., и . HCI (27), том 8030 из Lecture Notes in Computer Science, стр. 217-225. Springer, (2013)