From post

Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.

, , , , , , , , и . ISPEC, том 13107 из Lecture Notes in Computer Science, стр. 327-344. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The cyber threat landscape: Challenges and future research directions. Computers & Security, 30 (8): 719 - 731 (2011)Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model., , и . AMCIS, Association for Information Systems, (2014)Employees' Intended Information Security Behaviour in Real Estate Organisations: a Protection Motivation Perspective., , , и . AMCIS, Association for Information Systems, (2015)Enterprise Social Networks: A Successful Implementation within a Telecommunication Company., , и . AMCIS, Association for Information Systems, (2015)A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management., , , и . TrustCom/BigDataSE/ISPA (1), стр. 1073-1080. IEEE, (2015)Android Cache Taxonomy and Forensic Process., , и . TrustCom/BigDataSE/ISPA (1), стр. 1094-1101. IEEE, (2015)An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations., , , и . SecureComm (2), том 255 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 488-506. Springer, (2018)Heterogeneous investment in spatial public goods game with mixed strategy., , , , и . Soft Comput., 22 (4): 1287-1294 (2018)Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis., , , и . AISC, том 161 из CRPIT, стр. 53-56. Australian Computer Society, (2015)Empirical vulnerability analysis of automated smart contracts security testing on blockchains., , , и . CASCON, стр. 103-113. ACM, (2018)