From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Alter-egos and Roles: Supporting Workflow Security in Cyberspaces., , , и . DBSec, том 113 из IFIP Conference Proceedings, стр. 182-195. Chapman & Hall, (1997)Increasing Firewall Reliability by Recording Routes., и . Communications and Multimedia Security, том 70 из IFIP Conference Proceedings, стр. 303-314. Chapman & Hall, (1996)Data Hiding Techniques for Database Environments., и . IFIP Int. Conf. Digital Forensics, том 383 из IFIP Advances in Information and Communication Technology, стр. 289-301. Springer, (2012)Isolating Instances in Cloud Forensics., и . IFIP Int. Conf. Digital Forensics, том 383 из IFIP Advances in Information and Communication Technology, стр. 187-200. Springer, (2012)On granting limited access to private information., и . WWW, стр. 21-25. ACM, (2001)A Layered Architecture for Privacy-enhancing Technologies. South African Computer Journal, (2003)PIDS: A Privacy Intrusion Detection Systems, , и . Internet Research, 14 (5): 360--365 (2004)Assembling Metadata for Database Forensics., , и . IFIP Int. Conf. Digital Forensics, том 361 из IFIP Advances in Information and Communication Technology, стр. 89-99. Springer, (2011)Active Traffic Capture for Network Forensics., , и . IFIP Int. Conf. Digital Forensics, том 222 из IFIP Advances in Information and Communication Technology, стр. 215-228. Springer, (2006)Nature and Forensic investigation of crime in Second Life., , и . ISSA, ISSA, Pretoria, South Africa, (2011)