Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Splitting the HTTPS Stream to Attack Secure Web Connections., , , and . IEEE Secur. Priv., 8 (6): 80-84 (2010)RoboAdmin: A Different Approach to Remote System Administration., and . WOSIS, page 43-52. INSTICC Press, (2007)Privacy-Preserving Design of Data Processing Systems in the Public Transport Context., , , , and . Pac. Asia J. Assoc. Inf. Syst., 7 (4): 4 (2015)An Integrated Application of Security Testing Methodologies to e-voting Systems., and . ePart, volume 6229 of Lecture Notes in Computer Science, page 225-236. Springer, (2010)Password similarity using probabilistic data structures., , , and . CoRR, (2020)Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective., , , and . Comput. Secur., (2018)P-IOTA: A Cloud-Based Geographically Distributed Threat Alert System That Leverages P4 and IOTA., , , , , and . Sensors, 23 (6): 2955 (March 2023)A Security Monitoring Architecture based on Data Plane Programmability., , , , and . EuCNC/6G Summit, page 389-394. IEEE, (2021)An Application of Efficient Certificate Status Handling Methods to High Traffic Authentication Services., and . ISCC, page 821-827. IEEE Computer Society, (2003)Comment Spam Injection Made Easy., and . CCNC, page 1-5. IEEE, (2009)