Author of the publication

KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services.

, , and . IMCOM, page 20:1-20:6. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider., , and . ICSSA, page 19-24. IEEE, (2015)IoE Security Threats and You., , , , , and . ICSSA, page 13-19. IEEE, (2017)Data-Driven Selection of Security Application Frameworks During Architectural Design., , , , , , and . HICSS, page 1-10. ScholarSpace, (2019)An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks., , , and . PST, page 1-6. IEEE Computer Society, (2018)Threat Modeling and Analysis of Voice Assistant Applications., , , , and . WISA, volume 11402 of Lecture Notes in Computer Science, page 197-209. Springer, (2018)A centralized trust model approach for cloud computing., , , , and . WOCC, page 1-6. IEEE, (2014)Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress)., , and . ICSSA, page 34-37. IEEE, (2018)Computing Security Scores for IoT Device Vulnerabilities., , and . ICSSA, page 52-59. IEEE, (2019)Contrology - An Ontology-Based Cloud Assurance Approach., , and . WETICE, page 105-107. IEEE Computer Society, (2015)KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services., , and . IMCOM, page 20:1-20:6. ACM, (2015)