Search for persons
X
?
1
Privacy and Identity Management. Sharing in a Digital World..
IFIP Advances in Information and Communication Technology, 695
?
Privacy Technologies and Policy; Lecture Notes in Computer Science ,
2
A Universal Data Model for Data Sharing Under the European ..:
, In:
?
Communications in Computer and Information Science; Ubiquitous Security ,
3
Is It Really You Who Forgot the Password? When Account Reco..:
, In:
?
Privacy Technologies and Policy; Lecture Notes in Computer Science ,
4
Past and Present: A Case Study of Twitter's Responses to GD..:
, In:
?
Lecture Notes in Computer Science; Emerging Technologies for Authorization and Authentication ,
5
Protecting FIDO Extensions Against Man-in-the-Middle Attack:
, In:
?
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy ,
6
Risk-Based Authentication for OpenStack: A Fully Functional..:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
9
Multi-Account Dashboard for Authentication Dependency Analy..:
, In:
?
Freedom and Social Inclusion in a Connected World; IFIP Advances in Information and Communication Technology ,
10
Where There is No CISO:
, In:
?
Lecture Notes in Computer Science; Integrated Formal Methods ,
11
A Policy Language to Capture Compliance of Data Protection ..:
, In:
?
ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology ,
14
Less is Often More: Header Whitelisting as Semantic Gap Mit..:
, In:
?
Privacy Technologies and Policy; Lecture Notes in Computer Science ,
15