Ahmad, Samer
644  Ergebnisse:
Personensuche X
?
 
?
5

Article 45 of the eIDAS Directive Unveils the need to imple..:

, In: Proceedings of the 19th International Conference on Availability, Reliability and Security,
 
?
6

Authenticating HTTPS Connection without Relying on Certific..:

, In: 2024 15th Annual Undergraduate Research Conference on Applied Computing (URC),
 
?
7

Enhancing Secure Deployment with Ansible: A Focus on Least ..:

, In: Proceedings of the 19th International Conference on Availability, Reliability and Security,
 
?
8

Enhancing the ACME Protocol to Automate the Management of A..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
 
?
 
?
10

Implementing the Principle of Least Privilege Using Linux C..:

, In: 2023 7th Cyber Security in Networking Conference (CSNet),
 
?
 
?
 
?
 
?
15

Smart Identity Management System by Face Detection Using Mu..:

Farhi, Lubna ; Abbasi, Hira ; Rehman, Rija.
Security and Communication Networks.  2021 (2021)  - p. 1-11 , 2021
 
1-15