From post

Information Systems Security Management: A Review and a Classification of the ISO Standards.

, , , и . e-Democracy, том 26 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 220-235. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MILC: A secure and privacy-preserving mobile instant locator with chatting, , , , , и . Information Systems Frontiers, (2010)10.1007/s10796-010-9254-0.The significance of user-defined identifiers in Java source code authorship identification., , , , и . Comput. Syst. Sci. Eng., (2011)Signaling-Oriented DoS Attacks in UMTS Networks., , , и . ISA, том 5576 из Lecture Notes in Computer Science, стр. 280-289. Springer, (2009)Attaching Multiple Personal Identifiers in X.509 Digital Certificates., и . EuroPKI, том 6711 из Lecture Notes in Computer Science, стр. 171-177. Springer, (2010)Guest Editorial., , , и . J. Multim., 6 (4): 317-319 (2011)Performance evaluation of a distributed OCSP protocol over MANETs., , , и . CCNC, стр. 1-5. IEEE, (2006)An Agent Based Back-End RFID Tag Management System., , и . TrustBus, том 6264 из Lecture Notes in Computer Science, стр. 165-176. Springer, (2010)A Cluster-Based Framework for the Security of Medical Sensor Environments., , , и . TrustBus, том 5695 из Lecture Notes in Computer Science, стр. 52-62. Springer, (2009)Modelling Cloud Forensic-Enabled Services., , и . TrustBus, том 10442 из Lecture Notes in Computer Science, стр. 147-163. Springer, (2017)Privacy in the Cloud: Bridging the Gap between Design and Implementation., , , и . CAiSE Workshops, том 148 из Lecture Notes in Business Information Processing, стр. 455-465. Springer, (2013)