Author of the publication

Towards More Secure Web Services - Exploiting and Analysing XML Signature Security Issues.

, and . RCIS, page 49-58. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzer: A Complex System for Data Analysis., , , , , and . Comput. J., 55 (5): 590-615 (2012)An Analysis of Approaches to XML Schema Inference.. SITIS, page 16-23. IEEE Computer Society, (2008)Linked Data Indexing Methods: A Survey., and . OTM Workshops, volume 7046 of Lecture Notes in Computer Science, page 474-483. Springer, (2011)Similarity of DTDs Based on Edit Distance and Semantics., , and . IDC, volume 162 of Studies in Computational Intelligence, page 207-216. Springer, (2008)Efficient Detection of XML Integrity Constraints Violation., and . NDT (1), volume 293 of Communications in Computer and Information Science, page 259-273. Springer, (2012)Inference of XML Integrity Constraints., and . ADBIS (2), volume 186 of Advances in Intelligent Systems and Computing, page 285-296. Springer, (2012)Correction of Invalid XML Documents with Respect to Single Type Tree Grammars., and . NDT, volume 136 of Communications in Computer and Information Science, page 179-194. Springer, (2011)Towards Topic-Based Trust in Social Networks., and . UIC, volume 6406 of Lecture Notes in Computer Science, page 635-649. Springer, (2010)Web Quality Assessment Model: Trust in QA Social Networks., and . UIC, volume 6905 of Lecture Notes in Computer Science, page 252-266. Springer, (2011)Analyzer: A Framework for File Analysis., , , , and . DASFAA Workshops, volume 6193 of Lecture Notes in Computer Science, page 227-238. Springer, (2010)