Author of the publication

Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services.

, , , , , , , , , , , and . MODELSWARD, page 379-386. SciTePress, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Double-Size Bipartite Modular Multiplication., , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 230-244. Springer, (2007)Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication., , and . Selected Areas in Cryptography, volume 4356 of Lecture Notes in Computer Science, page 188-202. Springer, (2006)New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature., , , , , and . AsiaJCIS, page 54-58. IEEE, (2020)Key Update Mechanism Using All-or-Nothing Transform for Network Storage of Encrypted Data., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (1): 162-170 (2015)Key Update Mechanism for Network Storage of Encrypted Data., and . CloudCom (1), page 493-498. IEEE Computer Society, (2013)Upper bound of the shortest vector coefficients and its applications., , and . ISITA, page 426-430. IEEE, (2012)Auditable Zerocoin., , , and . EuroS&P Workshops, page 59-63. IEEE, (2017)Definition and Efficient Construction of Encrypted k-anonymization Scheme., , , and . ICISSP, page 293-300. SciTePress, (2019)Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem., , , and . IWSEC, volume 11049 of Lecture Notes in Computer Science, page 35-47. Springer, (2018)Symmetric Inner-Product Predicate Encryption Based on Three Groups., , , and . ProvSec, volume 7496 of Lecture Notes in Computer Science, page 215-234. Springer, (2012)