Author of the publication

Voter non-repudiation oriented scheme for the medium scale e-voting protocol.

, and . IMCSIT, page 325-330. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Modelling of Context-Aware Security for Mobile Devices., , and . Mob. Inf. Syst., (2016)Optimization of TLS security protocol using the adaptable security model., , and . Ann. UMCS Informatica, 9 (1): 59-75 (2009)Voter non-repudiation oriented scheme for the medium scale e-voting protocol., and . IMCSIT, page 325-330. IEEE, (2009)Using PHP and HTML languages to create graphical interfaces and to remote control of programs., and . Ann. UMCS Informatica, 1 (1): 304-309 (2003)Cryptographic protocol for electronic auctions with extended requirements., and . Ann. UMCS Informatica, 2 (1): 391-400 (2004)Adaptive Approach to Network Security., , and . CN, volume 39 of Communications in Computer and Information Science, page 233-241. Springer, (2009)Secure and Reliable Localization in Wireless Sensor Network Based on RSSI Mapping., , , and . CN, volume 718 of Communications in Computer and Information Science, page 55-69. Springer, (2017)On Scalable Security Audit for Web Application According to ISO 27002., and . CN, volume 160 of Communications in Computer and Information Science, page 289-297. Springer, (2011)Implementation of certification subprotocol for electronic auction., and . Ann. UMCS Informatica, 3 (1): 355-364 (2005)A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks., and . SECRYPT, page 728-733. SCITEPRESS, (2021)