Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tesfay, Welderufael
add a person with the name Tesfay, Welderufael
 

Other publications of authors with the same name

Towards the Adoption of Secure Cloud Identity Services., , , , , , , and . ARES, page 90:1-90:7. ACM, (2017)Challenges in Detecting Privacy Revealing Information in Unstructured Text., , and . PrivOn@ISWC, volume 1750 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences., , , and . DPM/CBT@ESORICS, volume 10436 of Lecture Notes in Computer Science, page 107-123. Springer, (2017)Personalised Privacy by Default Preferences - Experiment and Analysis., , , and . ICISSP, page 53-62. SciTePress, (2016)Assessing Privacy Policies of Internet of Things Services., , , , and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 156-169. Springer, (2018)Towards User-Centered Privacy Risk Detection and Quantification Framework., and . NTMS, page 1-5. IEEE, (2016)Reputation Based Security Model for Android Applications., , and . TrustCom, page 896-901. IEEE Computer Society, (2012)NexTrend: Context-Aware Music-Relay Corridors Using NFC Tags., , , , , and . IMIS, page 573-578. IEEE Computer Society, (2013)PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation., , , , and . IWSPA@CODASPY, page 15-21. ACM, (2018)A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications., , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2019)