From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

GDPR Compliance: Proposed Technical and Organizational Measures for Cloud Providers., , и . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, том 11980 из Lecture Notes in Computer Science, стр. 181-194. Springer, (2019)ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence., , и . TrustBus, том 8058 из Lecture Notes in Computer Science, стр. 137-148. Springer, (2013)Microtargeting or Microphishing? Phishing Unveiled., , , и . TrustBus, том 12395 из Lecture Notes in Computer Science, стр. 89-105. Springer, (2020)An ontology-based policy for deploying secure SIP-based VoIP services., , и . Comput. Secur., 27 (7-8): 285-297 (2008)Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy.. Inf. Manag. Comput. Secur., 21 (3): 177-190 (2013)Risk analysis of a patient monitoring system using Bayesian Network modeling., , , и . J. Biomed. Informatics, 39 (6): 637-647 (2006)IntentAuth: Securing Android's Intent-based inter-process communication., , и . Int. J. Inf. Sec., 21 (5): 973-982 (2022)IoT Forensics: Analysis of Ajax Systems' mobile app for the end user., и . CSR, стр. 446-451. IEEE, (2023)A Practical Steganographic Approach for Matroska Based High Quality Video Files., , , и . AINA Workshops, стр. 684-688. IEEE Computer Society, (2013)Cloud Computing Security Requirements and a Methodology for Their Auditing., и . e-Democracy, том 570 из Communications in Computer and Information Science, стр. 51-61. Springer, (2015)