Author of the publication

Is Europe Ready for a Pan-European Identity Management System?

, , and . IEEE Security & Privacy, 10 (4): 44-49 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A careful design for a tool to detect child pornography in P2P networks., , , and . ISTAS, page 227-233. IEEE, (2010)Use of web service orchestration strategies in operations on digital democracy platform., , , , and . EATIS, page 50. (2007)An Ecological Approach to Anomaly Detection: The EIA Model., , , and . ICARIS, volume 7597 of Lecture Notes in Computer Science, page 232-245. Springer, (2012)Solving Identity Management and Interoperability Problems at Pan-European Level., and . OTM Workshops, volume 5872 of Lecture Notes in Computer Science, page 805-809. Springer, (2009)Analysis of electronic and telematic voting systems in binding experiences., , , and . EATIS, page 25-32. ACM, (2012)Digital identity applied to telematic voting involving European citizens. Social and legal implications., , , and . ISTAS, page 268-274. IEEE, (2010)Contributions to Traditional Electronic Voting Systems in order to Reinforce Citizen Confidence., , and . Electronic Voting, volume P-86 of LNI, page 39-49. GI, (2006)Current Trends in Pan-European Identity Management Systems., , , and . IEEE Technol. Soc. Mag., 31 (3): 44-50 (2012)Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML., and . WISTP, volume 6033 of Lecture Notes in Computer Science, page 183-198. Springer, (2010)Detection of distributed steganographic information in social networks., , and . EATIS, (2008)