Wazan, Ahmad Samer
118  Ergebnisse:
Personensuche X
?
2

Enhancing the ACME Protocol to Automate the Management of A..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
 
?
3

Implementing the Principle of Least Privilege Using Linux C..:

, In: 2023 7th Cyber Security in Networking Conference (CSNet),
 
?
5

On the Validation of Web X.509 Certificates by TLS Intercep..:

Wazan, Ahmad Samer ; Laborde, Romain ; Chadwick, David W....
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  1 - p. 227-242 , 2022
 
?
6

Smart Identity Management System by Face Detection Using Mu..:

Farhi, Lubna ; Abbasi, Hira ; Rehman, Rija.
Security and Communication Networks.  2021 (2021)  - p. 1-11 , 2021
 
?
 
?
8

Privacy-Preserving Two-Factor Key Agreement Protocol Based ..:

Tan, Zuowen ; Wazan, Ahmad Samer
Security and Communication Networks.  2021 (2021)  - p. 1-21 , 2021
 
?
 
?
 
?
11

RootAsRole: Towards a Secure Alternative to sudo/su Command..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
 
?
12

Should We Rush to Implement Password-less Single Factor FID..:

, In: 2020 12th Annual Undergraduate Research Conference on Applied Computing (URC),
 
?
13

Logic-based methodology to help security architects in elic..:

, In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing,
 
?
14

Applying a requirement engineering based approach to evalua..:

, In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing,
 
?
 
1-15