From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Technique for Enhanced Provision of Appropriate Access to Evidence Across Service Provision Chains., , , и . Privacy and Identity Management, том 476 из IFIP Advances in Information and Communication Technology, стр. 187-204. Springer, (2015)Privacy-Preserving Identity Management as a Service., , и . A4Cloud, том 8937 из Lecture Notes in Computer Science, стр. 114-125. Springer, (2014)Metrics for Accountability in the Cloud., и . A4Cloud, том 8937 из Lecture Notes in Computer Science, стр. 129-153. Springer, (2014)Cryptography Goes to the Cloud., , , , и . STA Workshops, том 187 из Communications in Computer and Information Science, стр. 190-197. Springer, (2011)Match Me if You Can: Matchmaking Encryption and Its Applications., , , и . CRYPTO (2), том 11693 из Lecture Notes in Computer Science, стр. 701-731. Springer, (2019)Managing Incidents in Smart Grids à la Cloud., , , и . CloudCom, стр. 527-531. IEEE Computer Society, (2011)Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity., , , , , , , и . ISSE, стр. 195-206. Springer, (2012)BlindIdM: A privacy-preserving approach for identity management as a service., и . Int. J. Inf. Sec., 13 (2): 199-215 (2014)The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol., , и . DBSec, том 10359 из Lecture Notes in Computer Science, стр. 453-472. Springer, (2017)Delegated Access for Hadoop Clusters in the Cloud., , и . CloudCom, стр. 374-379. IEEE Computer Society, (2014)