From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated Synthesis and Ranking of Secure BPMN Orchestrators., , , , , и . Int. J. Secur. Softw. Eng., 5 (2): 44-64 (2014)Towards the COSCA framework for "COnseptualing Secure CArs"., , , , и . Open Identity Summit, том P-312 из LNI, стр. 37-46. Gesellschaft für Informatik e.V., (2021)Full-protocol safety analysis of CINNAMON., , и . VTC Spring, стр. 1-7. IEEE, (2022)EARNEST: A challenge-based intrusion prevention system for CAN messages., , и . ISSRE Workshops, стр. 243-248. IEEE, (2020)Presente Digitale: An Online Education System for Teachers., , , , и . HELMeTO, том 1344 из Communications in Computer and Information Science, стр. 271-285. Springer, (2020)Enforcing Mobile Application Security Through Probabilistic Contracts., , , и . ESSoS Doctoral Symposium, том 1298 из CEUR Workshop Proceedings, CEUR-WS.org, (2014)Application of Secure Two-Party Computation in a Privacy-Preserving Android App., , , и . ARES, стр. 144:1-144:7. ACM, (2023)Definition of Data Sharing Agreements - The Case of Spanish Data Protection Law., , , и . A4Cloud, том 8937 из Lecture Notes in Computer Science, стр. 248-272. Springer, (2014)Are you secure in your car?: poster., , , и . WiSec, стр. 308-309. ACM, (2019)Trust-Driven Policy Enforcement through Gate Automata., и . IMIS, стр. 208-215. IEEE Computer Society, (2011)