Author of the publication

Network security and digital forensics in next generation communications.

, , , and . Wireless Communications and Mobile Computing, 11 (2): 143-145 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Preserving Data Mining Using Radial Basis Functions on Horizontally Partitioned Databases in the Malicious Model., , and . International Journal on Artificial Intelligence Tools, (2014)Support of subscribers' certificates in a hybrid WLAN-3G environment., , , and . Computer Networks, 50 (11): 1843-1859 (2006)Mathematical and Computer Modelling in Information System Security., and . Mathematical and Computer Modelling, 57 (11-12): 2581-2582 (2013)A good-practice guidance on the use of PKI services in the public sector of the European Union member states.. Inf. Manag. Comput. Security, 13 (5): 379-398 (2005)Security requirements, risks and recommendations for small enterprise and home-office environments., , and . Inf. Manag. Comput. Security, 7 (3): 121-128 (1999)Risk management for new information technology insertion in a shipping company., and . Operational Research, 1 (1): 7-16 (2001)KAMU: providing advanced user privacy in Kerberos multi-domain scenarios., , , , , and . Int. J. Inf. Sec., 12 (6): 505-525 (2013)Deploying pervasive secure knowledge management infrastructures., , , , , and . Int. J. Pervasive Computing and Communications, 1 (4): 265-276 (2005)Developing a culture of privacy in the Global Village.. Telematics and Informatics, 23 (3): 157-163 (2006)Distributed component architectures security issues., , and . Computer Standards & Interfaces, 27 (3): 269-284 (2005)