Author of the publication

Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme.

, , , , , and . SERVICES, page 121-128. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Practical Searchable Symmetric Encryption., , , and . IWSEC, volume 8231 of Lecture Notes in Computer Science, page 151-167. Springer, (2013)Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)., , , and . Int. J. Inf. Sec., 19 (1): 15-38 (2020)Helping Johnny to Search: Usable Encrypted Search on Webmail System., , and . J. Inf. Process., (2019)METRO: Measurement of End-to-End Route Trust., , , and . AsiaJCIS, page 31-38. IEEE Computer Society, (2014)Helping Johnny to Search: Encrypted Search on Webmail System., , and . AsiaJCIS, page 47-53. IEEE Computer Society, (2018)Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation., and . AsiaJCIS, page 15-22. IEEE Computer Society, (2017)Transparent Probabilistic Packet Marking., , , and . J. Inf. Process., 22 (4): 609-616 (2014)Vision: How to Provide Documentation to Non-skilled Developers for Appropriate Use of Cryptography: Action Research Study on Expert Monitoring., and . EuroUSEC, page 218-223. ACM, (2023)32-bit as Number Based IP Traceback., , , and . IMIS, page 628-633. IEEE Computer Society, (2011)Multivariate Statistical Analysis of Network Traffic for Intrusion Detection., and . DEXA Workshops, page 472-476. IEEE Computer Society, (2003)