From post

Building a Privacy Testbed: Use Cases and Design Considerations.

, , , , , и . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, том 13106 из Lecture Notes in Computer Science, стр. 185-193. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Anonymous Context Based Role Activation Mechanism., , и . Security Protocols Workshop, том 4631 из Lecture Notes in Computer Science, стр. 315-321. Springer, (2005)Beyond Trust., и . Security Protocols Workshop, том 8809 из Lecture Notes in Computer Science, стр. 340-344. Springer, (2014)Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities., , , , , , , и . Proc. ACM Hum. Comput. Interact., 7 (CSCW2): 1-21 (2023)Self Attestation of Things., и . Security Protocols Workshop, том 10476 из Lecture Notes in Computer Science, стр. 76-84. Springer, (2017)Better Call Saltzer & Schroeder: A Retrospective Security Analysis of SolarWinds & Log4j., , и . CoRR, (2022)Towards Human-Centric Endpoint Security (Transcript of Discussion).. Security Protocols Workshop, том 14186 из Lecture Notes in Computer Science, стр. 220-227. Springer, (2023)Self Attestation of Things (Transcript of Discussion).. Security Protocols Workshop, том 10476 из Lecture Notes in Computer Science, стр. 85-92. Springer, (2017)Threat Models over Space and Time: A Case Study of E2EE Messaging Applications., , , , , , , и . CoRR, (2023)Anonymity and trust in the electronic world.. University of Hertfordshire, UK, (2005)British Library, EThOS.Beyond Trust (Transcript of Discussion).. Security Protocols Workshop, том 8809 из Lecture Notes in Computer Science, стр. 345-349. Springer, (2014)