From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Common Cybersecurity Requirements in IoT Standards, Best Practices, and Guidelines., , и . IoTBDS, стр. 149-156. SCITEPRESS, (2022)A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms., , , , и . HCSE, том 12481 из Lecture Notes in Computer Science, стр. 61-83. Springer, (2020)Implementing Post-quantum Cryptography for Developers., , и . ICISSP, стр. 73-83. SCITEPRESS, (2022)Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC., , , и . SECRYPT, стр. 659-664. SCITEPRESS, (2021)Implementing Post-quantum Cryptography for Developers., , , и . SN Comput. Sci., 4 (4): 365 (июля 2023)Applying a cryptographic metric to post-quantum lattice-based signature algorithms., , , и . ARES, стр. 87:1-87:8. ACM, (2022)Vulnerabilities in IoT Devices, Backends, Applications, and Components., , и . ICISSP, стр. 659-668. SciTePress, (2023)Transparent Security Method for Automating IoT Security Assessments., , , и . ISPEC, том 14341 из Lecture Notes in Computer Science, стр. 138-153. Springer, (2023)CryptoVault - A Secure Hardware Wallet for Decentralized Key Management., , , , и . COINS, стр. 1-4. IEEE, (2021)Context-aware systems and adaptive user authentication, и . Evolving Ambient Intelligence, Springer, (2013)