Author of the publication

Introduction to the Minitrack on Cybersecurity and Privacy in Government.

, , and . HICSS, page 1880. ScholarSpace, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing the Tate Pairing., , and . ANTS, volume 2369 of Lecture Notes in Computer Science, page 324-337. Springer, (2002)GAP: An Exercise in Model Oriented Programming.. ALPUK, page 159-172. Intellect Books and Kluwer Academic Publishers, (1990)Efficient Retrieval of Key Material for Inspecting Potentially Malicious Traffic in the Cloud., , and . IC2E, page 155-164. IEEE Computer Society, (2015)The HP time vault service: exploiting IBE for timed release of confidential information., , and . WWW, page 160-169. ACM, (2003)Certification of Public Keys within an Identity Based System., , , , and . ISC, volume 2433 of Lecture Notes in Computer Science, page 322-333. Springer, (2002)The Honey Community: Use of Combined Organizational Data for Community Protection., , and . HICSS, page 2288-2297. IEEE Computer Society, (2015)Forensic Virtual Machines: Dynamic Defence in the Cloud via Introspection., , , , and . IC2E, page 303-310. IEEE Computer Society, (2014)Introduction to the Minitrack on Cybersecurity and Privacy in Government., , and . HICSS, page 1. ScholarSpace, (2021)Introduction to the Minitrack on Cybersecurity and Privacy in Government., , and . HICSS, page 1. ScholarSpace, (2022)Introduction to Cybersecurity and Government Minitrack., , and . HICSS, page 1. ScholarSpace / AIS Electronic Library (AISeL), (2017)