From post

A Generic Privacy Enhancing Technology for Pervasive Computing Environments.

, , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 103-113. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Editorial., и . Comput. Secur., 29 (1): 1-2 (2010)Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks., , , , и . ICETE (2), стр. 219-229. SciTePress, (2018)Profiling online social networks users: an omniopticon tool., , , и . IJSNM, 2 (4): 293-313 (2017)Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0., , и . Int. J. Inf. Sec., 21 (1): 37-59 (2022)Revisiting Legal and Regulatory Requirements for Secure E-Voting., , и . SEC, том 214 из IFIP Conference Proceedings, стр. 469-480. Kluwer, (2002)Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures., , , , и . SIGMETRICS Perform. Evaluation Rev., 45 (2): 119-124 (2017)Assessing n-order dependencies between critical infrastructures., , и . Int. J. Crit. Infrastructures, 9 (1/2): 93-110 (2013)Security Busters: Web browser security vs. rogue sites., , , и . Comput. Secur., (2015)A Cloud Provider-Agnostic Secure Storage Protocol., , и . CRITIS, том 6712 из Lecture Notes in Computer Science, стр. 104-115. Springer, (2010)Browser Blacklists: The Utopia of Phishing Protection., , , , и . ICETE (Selected Papers), том 554 из Communications in Computer and Information Science, стр. 278-293. Springer, (2014)