Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Splitting the HTTPS Stream to Attack Secure Web Connections., , , and . IEEE Secur. Priv., 8 (6): 80-84 (2010)RoboAdmin: A Different Approach to Remote System Administration., and . WOSIS, page 43-52. INSTICC Press, (2007)An Integrated Application of Security Testing Methodologies to e-voting Systems., and . ePart, volume 6229 of Lecture Notes in Computer Science, page 225-236. Springer, (2010)Privacy-Preserving Design of Data Processing Systems in the Public Transport Context., , , , and . Pac. Asia J. Assoc. Inf. Syst., 7 (4): 4 (2015)Password similarity using probabilistic data structures., , , and . CoRR, (2020)P-IOTA: A Cloud-Based Geographically Distributed Threat Alert System That Leverages P4 and IOTA., , , , , and . Sensors, 23 (6): 2955 (March 2023)Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective., , , and . Comput. Secur., (2018)Comment Spam Injection Made Easy., and . CCNC, page 1-5. IEEE, (2009)An Application of Efficient Certificate Status Handling Methods to High Traffic Authentication Services., and . ISCC, page 821-827. IEEE Computer Society, (2003)Taking the Best of Both Worlds: A Comparison and Integration of the U.S. and EU Approaches to E-Voting Systems Evaluation., and . HICSS, page 1-10. IEEE Computer Society, (2011)