Author of the publication

A Novel Security Risk Evaluation for Information Systems.

, , , and . FCST, page 67-73. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust Inference Path Search with Minimum Uncertainty for E-Commerce., , and . IEEE WISA, page 133-137. IEEE Computer Society, (2013)An Improved Direct Trust Evaluation Algorithm for the Context-Aware Trust Model., , and . IMIS, page 196-201. IEEE Computer Society, (2013)Design and Implementation of a Practical Secure Distributed Healthcare Application., and . SECRYPT, page 431-436. INSTICC Press, (2006)Uncertainty Trust Model in E-commerce Environment., , and . CISIM, page 261-266. IEEE Computer Society, (2008)Trust Relationship Modelling in E-commerce-Based Social Network., , , and . CIS (1), page 206-210. IEEE Computer Society, (2009)Discovery of the Optimal Trust Inference Path for Online Social Networks., , and . IEICE Trans. Inf. Syst., 97-D (4): 673-684 (2014)Business-Process-Oriented Software Requirements Automatic Generator., , , and . ICITA (1), page 95-98. IEEE Computer Society, (2005)A Blocked Rainbow Table Time-Memory Trade-Off Method., , and . IEEE WISA, page 324-329. IEEE Computer Society, (2015)A Middleware-Based Script Language., , and . ICMB, page 690-693. IEEE Computer Society, (2005)Improving Software Security Through an Integrated Approach., , and . SECRYPT, page 437-442. INSTICC Press, (2006)