Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Software Development in the Era of Fluid Multi-party Open Software and Services., , , and . ICSE (NIER), page 91-95. IEEE, (2021)Typosquatting and Combosquatting Attacks on the Python Ecosystem., , , , and . EuroS&P Workshops, page 509-514. IEEE, (2020)Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard., , and . ER, volume 2813 of Lecture Notes in Computer Science, page 263-276. Springer, (2003)Formal Verification of Cardholder Registration in SET., , , and . ESORICS, volume 1895 of Lecture Notes in Computer Science, page 159-174. Springer, (2000)Privacy Is Linking Permission to Purpose., and . Security Protocols Workshop, volume 3957 of Lecture Notes in Computer Science, page 179-191. Springer, (2004)Simplification: A General Constraint Propagation Technique for Propositional and Modal Tableaux.. TABLEAUX, volume 1397 of Lecture Notes in Computer Science, page 217-231. Springer, (1998)A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach., and . FOSAD, volume 6858 of Lecture Notes in Computer Science, page 152-184. Springer, (2011)DES: a Challenge Problem for Nonmonotonic Reasoning Systems, , and . CoRR, (2000)Action, Inaction, Trust, and Cybersecurity's Common Property Problem., , and . IEEE Secur. Priv., 14 (1): 82-86 (2016)Lightweight Parsing and Slicing for Bug Identification in C., , , and . ARES, page 114:1-114:10. ACM, (2022)