From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Diversity: A Poor Man's Solution to Drone Takeover., , и . PECCS, стр. 25-34. SciTePress, (2017)How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach., , , , и . ICAIL, стр. 149-153. ACM, (2007)Maintaining privacy on derived objects., , , и . WPES, стр. 10-19. ACM, (2005)Simplification: A General Constraint Propagation Technique for Propositional and Modal Tableaux.. TABLEAUX, том 1397 из Lecture Notes in Computer Science, стр. 217-231. Springer, (1998)A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach., и . FOSAD, том 6858 из Lecture Notes in Computer Science, стр. 152-184. Springer, (2011)An Empirical Methodology to Evaluate Vulnerability Discovery Models., и . IEEE Trans. Software Eng., 40 (12): 1147-1162 (2014)Formal Verification of Cardholder Registration in SET., , , и . ESORICS, том 1895 из Lecture Notes in Computer Science, стр. 159-174. Springer, (2000)Privacy Is Linking Permission to Purpose., и . Security Protocols Workshop, том 3957 из Lecture Notes in Computer Science, стр. 179-191. Springer, (2004)Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard., , и . ER, том 2813 из Lecture Notes in Computer Science, стр. 263-276. Springer, (2003)Exptime Tableaux for ALC., , и . Description Logics, том WS-96-05 из AAAI Technical Report, стр. 107-110. AAAI Press, (1996)