Author of the publication

Strengthening Enforcement in a Comprehensive Architecture for Privacy Enforcement at Internet Websites.

, , , , , and . Frontiers Comput. Sci., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Master Key.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Identification.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Trusted Third Party.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)User Authentication.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)KEAML - Key Exchange and Authentication Markup Language., and . CCECE, page 634-638. IEEE, (2006)Designing Against the 'Overdefined System of Equations' Attack.. IACR Cryptology ePrint Archive, (2004)The CAST-256 Encryption Algorithm., and . RFC, (June 1999)Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)., , , and . RFC, (August 2001)Internet X.509 Public Key Infrastructure Certificate Management Protocols., and . RFC, (March 1999)Certificate.. Encyclopedia of Cryptography and Security, Springer, (2005)