Author of the publication

Strengthening Enforcement in a Comprehensive Architecture for Privacy Enforcement at Internet Websites.

, , , , , and . Frontiers Comput. Sci., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

KEAML - Key Exchange and Authentication Markup Language., and . CCECE, page 634-638. IEEE, (2006)IDUP and SPKM: Developing Public-Key-Based APIs and Mechanisms for Communication Security Services.. NDSS, page 128-136. IEEE Computer Society, (1996)Profiles and protocols for the Internet Public-Key Infrastructure., and . FTDCS, page 220-224. IEEE Computer Society, (1997)Platform for privacy preferences (P3P): Current status and future directions., , and . PST, page 217-220. IEEE Computer Society, (2012)You are the key: Generating cryptographic keys from voice biometrics., and . PST, page 213-222. IEEE, (2010)Cryptographic security models for eHealth P2P database management systems network., , , , , and . PST, page 164-173. IEEE, (2011)Secure Multi-Party linear Regression., , , and . EDBT/ICDT Workshops, volume 1133 of CEUR Workshop Proceedings, page 406-414. CEUR-WS.org, (2014)Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset., , and . WiseML@WiSec, page 25-30. ACM, (2020)Using biometric key commitments to prevent unauthorized lending of cryptographic credentials., , and . PST, page 75-83. IEEE Computer Society, (2014)Privacy Preserving Discovery of Nearby-Friends., and . MCETECH, volume 289 of Lecture Notes in Business Information Processing, page 41-55. (2017)