From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Digital identity applied to telematic voting involving European citizens. Social and legal implications., , , и . ISTAS, стр. 268-274. IEEE, (2010)Improving N-Gram Linguistic Steganography based on Templates., , и . SECRYPT, стр. 209-212. SciTePress, (2010)Analysis of electronic and telematic voting systems in binding experiences., , , и . EATIS, стр. 25-32. ACM, (2012)Hierarchical Organization of Certification Authorities for Secure Environments., и . NDSS, стр. 112-121. IEEE Computer Society, (1997)A careful design for a tool to detect child pornography in P2P networks., , , и . ISTAS, стр. 227-233. IEEE, (2010)PRNG based on new HCI devices entropy sources: Wii remote study case., , и . EATIS, стр. 5. (2009)Social and legal implications of digital identity in a multi-national environment., , , и . ISTAS, стр. 484-490. IEEE, (2010)Design of an Advanced Platform for Citizen Participation Committed to Ensuring Freedom of Speech., , , , , , и . J. Theor. Appl. Electron. Commer. Res., 1 (2): 58-71 (2006)Measuring the Security of Linguistic Steganography in Spanish based on Synonymous Paraphrasing with WSD., , и . CIT, стр. 965-970. IEEE Computer Society, (2010)Use of the new Smart Identity Card to reinforce electronic voting guarantees., и . ICITST, стр. 1-6. IEEE, (2009)