Author of the publication

Strengthening Enforcement in a Comprehensive Architecture for Privacy Enforcement at Internet Websites.

, , , , , and . Frontiers Comput. Sci., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

KEAML - Key Exchange and Authentication Markup Language., and . CCECE, page 634-638. IEEE, (2006)Profiles and protocols for the Internet Public-Key Infrastructure., and . FTDCS, page 220-224. IEEE Computer Society, (1997)Platform for privacy preferences (P3P): Current status and future directions., , and . PST, page 217-220. IEEE Computer Society, (2012)You are the key: Generating cryptographic keys from voice biometrics., and . PST, page 213-222. IEEE, (2010)Cryptographic security models for eHealth P2P database management systems network., , , , , and . PST, page 164-173. IEEE, (2011)IDUP and SPKM: Developing Public-Key-Based APIs and Mechanisms for Communication Security Services.. NDSS, page 128-136. IEEE Computer Society, (1996)An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control., , and . IWAP, volume 128 of Frontiers in Artificial Intelligence and Applications, page 139-154. IOS Press, (2005)Certificate.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Privacy Preserving Discovery of Nearby-Friends., and . MCETECH, volume 289 of Lecture Notes in Business Information Processing, page 41-55. (2017)Secure Multi-Party linear Regression., , , and . EDBT/ICDT Workshops, volume 1133 of CEUR Workshop Proceedings, page 406-414. CEUR-WS.org, (2014)