Author of the publication

Profile-based digital identity management - a better way to combat fraud.

, , and . ISTAS, page 260-267. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Prolog Environment system.. Australian Computer Journal, 18 (2): 87-89 (1986)A Structuring Concept for Securing Modern Day Computing Systems., , , and . ICCS, volume 51 of Procedia Computer Science, page 2764-2768. Elsevier, (2015)Adding Contracts to Java.. TOOLS (27), page 2-7. IEEE Computer Society, (1998)A Case Study in Deterministic Prolog.. Australian Joint Conference on Artificial Intelligence, volume 406 of Lecture Notes in Computer Science, page 142-155. Springer, (1988)Application Level User Interfaces for Various Media., and . TOOLS (32), page 16-27. IEEE Computer Society, (1999)Using Ajax to Track Student Attention.. IJWP, 2 (4): 18-27 (2010)Service Discovery for Distributed Multimedia Systems.. iiWAS, volume 183 of books@ocg.at, Austrian Computer Society, (2004)Lessons from Open Source: Intellectual Property and Courseware.. First Monday, (2001)Grouping Verifiable Content for Selective Disclosure., , , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 1-12. Springer, (2003)W3 Trust-Profiling Framework (W3TF) to Assess Trust and Transitivity of Trust of Web-Based Services in a Heterogeneous Web Environment., , , and . APWeb, volume 3841 of Lecture Notes in Computer Science, page 367-378. Springer, (2006)