Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic Website Verification for Privacy Protection., , , , , and . IAS, page 231-234. IEEE Computer Society, (2008)Reconstructing a formal security model., , and . Information & Software Technology, 44 (11): 649-657 (2002)Towards secure information sharing using role-based delegation., , and . J. Network and Computer Applications, 30 (1): 42-59 (2007)Information Assurance in Federated Identity Management: Experimentations and Issues., , and . WISE, volume 3306 of Lecture Notes in Computer Science, page 78-89. Springer, (2004)Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems., and . Communications and Multimedia Security, volume 4237 of Lecture Notes in Computer Science, page 206-215. Springer, (2006)A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR., , , and . Sensors, 21 (23): 7994 (2021)An Enhanced Network-based Mobility Management Protocol for Fast Mobility Support., , , , and . TIIS, 5 (11): 1997-2015 (2011)A Method of Risk Assessment for Multi-Factor Authentication., and . JIPS, 7 (1): 187-198 (2011)Access Control Management for SCADA Systems., , and . IEICE Transactions, 91-D (10): 2449-2457 (2008)Group Hierarchies with Constrained User Assignment in Linux., and . WOSIS, page 13-22. INSTICC Press, (2004)