Author of the publication

Privacy-Preserving Design of Data Processing Systems in the Public Transport Context.

, , , , and . Pac. Asia J. Assoc. Inf. Syst., 7 (4): 4 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RoboAdmin: A Different Approach to Remote System Administration., and . WOSIS, page 43-52. INSTICC Press, (2007)An Integrated Application of Security Testing Methodologies to e-voting Systems., and . ePart, volume 6229 of Lecture Notes in Computer Science, page 225-236. Springer, (2010)P-IOTA: A Cloud-Based Geographically Distributed Threat Alert System That Leverages P4 and IOTA., , , , , and . Sensors, 23 (6): 2955 (March 2023)Password Similarity Using Probabilistic Data Structures., , , and . J. Cybersecur. Priv., 1 (1): 78-92 (December 2020)Privacy-Preserving Design of Data Processing Systems in the Public Transport Context., , , , and . Pac. Asia J. Assoc. Inf. Syst., 7 (4): 4 (2015)Taking the Best of Both Worlds: A Comparison and Integration of the U.S. and EU Approaches to E-Voting Systems Evaluation., and . HICSS, page 1-10. IEEE Computer Society, (2011)Comment Spam Injection Made Easy., and . CCNC, page 1-5. IEEE, (2009)An Application of Efficient Certificate Status Handling Methods to High Traffic Authentication Services., and . ISCC, page 821-827. IEEE Computer Society, (2003)In-Network Encryption for Secure Industrial Control Systems Communications., , , , , and . NetSoft, page 190-194. IEEE, (2024)A high throughput Intrusion Detection System (IDS) to enhance the security of data transmission among research centers., , , and . CoRR, (2023)