Ahmad, Samer
813  Ergebnisse:
Personensuche X
?
 
?
5

Article 45 of the eIDAS Directive Unveils the need to imple..:

, In: Proceedings of the 19th International Conference on Availability, Reliability and Security,
 
?
6

Authenticating HTTPS Connection without Relying on Certific..:

, In: 2024 15th Annual Undergraduate Research Conference on Applied Computing (URC),
 
?
7

Enhancing Secure Deployment with Ansible: A Focus on Least ..:

, In: Proceedings of the 19th International Conference on Availability, Reliability and Security,
 
?
8

Enhancing the ACME Protocol to Automate the Management of A..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
 
?
 
?
10

Implementing the Principle of Least Privilege Using Linux C..:

, In: 2023 7th Cyber Security in Networking Conference (CSNet),
 
?
11

On the Validation of Web X.509 Certificates by TLS Intercep..:

Wazan, Ahmad Samer ; Laborde, Romain ; Chadwick, David W....
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  1 - p. 227-242 , 2022
 
?
 
?
 
?
15

RootAsRole: Towards a Secure Alternative to sudo/su Command..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
 
1-15