From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Revisiting Legal and Regulatory Requirements for Secure E-Voting., , и . SEC, том 214 из IFIP Conference Proceedings, стр. 469-480. Kluwer, (2002)ARIBC: Online Reporting Based on Identity-Based Cryptography., и . Future Internet, 13 (2): 53 (2021)Designing a seamless privacy policy for social networks., и . Panhellenic Conference on Informatics, стр. 139-143. ACM, (2015)Compliance of the Facebook Data Use Policy with the Principles of ISO 29100: 2011., и . NTMS, стр. 1-5. IEEE, (2014)Authentication of Underwater Assets., , , и . CoRR, (2022)Modelling Shipping 4.0: A Reference Architecture for the Cyber-Enabled Ship., , и . ACIIDS (2), том 12034 из Lecture Notes in Computer Science, стр. 202-217. Springer, (2020)Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure., , и . ICISSP, стр. 187-194. SCITEPRESS, (2024)WYK: Mobile Device Authentication Using the User's Address Book., , и . ETAA, том 13136 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2021)Optimal state estimation for uncertain, time varying systems with non-Gaussian initial state., , и . ICASSP, стр. 1877-1880. IEEE Computer Society, (1991)Design of a dynamic log management infrastructure using risk and affiliation network analysis., и . PCI, стр. 52-57. ACM, (2018)