Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Shift to Decentralised Identity Management in Distributed Data Exchange Systems., , , and . SAC, page 864-873. ACM, (2023)Information Security and Privacy Management in Intelligent Transportation Systems., , and . Complex Syst. Informatics Model. Q., (2024)Tool-supported method for privacy analysis of a business process model., , and . J. Inf. Secur. Appl., (August 2023)Information Security Risks Analysis and Assessment in the Passenger-Autonomous Vehicle Interaction., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 13 (1): 87-111 (2022)A Decentralised Public Key Infrastructure for X-Road., , , , and . ARES, page 128:1-128:8. ACM, (2023)Information Security Analysis in the Passenger-Autonomous Vehicle Interaction., and . ARES, page 151:1-151:10. ACM, (2021)Ontological Representation of Healthcare Application Security Using Blockchain Technology., , , , , and . Informatica, 33 (2): 365-397 (2022)Towards More Secure and Data Protective Intelligent Infrastructure Systems.. CAiSE (Doctoral Consortium), volume 3407 of CEUR Workshop Proceedings, page 35-44. CEUR-WS.org, (2023)CHESS: Cyber-security Excellence Hub in Estonia and South Moravia., , and . CAiSE Research Projects Exhibition, volume 3692 of CEUR Workshop Proceedings, page 10-17. CEUR-WS.org, (2024)