From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Specifying and implementing privacy-preserving cryptographic protocols. University of the Aegean, Greece, (2008)National Archive of PhD Theses: oai:10442/26092.An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder., , и . Communications and Multimedia Security, том 175 из IFIP, стр. 209-221. Springer, (2004)A Framework for Exploiting Security Expertise in Application Development., , , , , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 62-70. Springer, (2006)Incorporating Security Requirements Into the Software Development Process., , , , , и . ECIW, стр. 21-28. Academic Conferences Limited, Reading, UK, (2005)Specifying electronic voting protocols in typed MSR., , и . WPES, стр. 35-39. ACM, (2005)Employing Ontologies for the Development of Security Critical Applications., , , , , , и . I3E, том 189 из IFIP, стр. 187-201. Springer, (2005)An ontology for secure e-government applications., , , , , , и . ARES, стр. 1033-1037. IEEE Computer Society, (2006)Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols., и . DEXA Workshops, стр. 396-401. IEEE Computer Society, (2003)