Search for persons
X
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
4
TRUSTEE: Towards the creation of secure, trustworthy and pr..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
5
Multi-Attribute Decision Making-based Trust Score Calculati..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
6
Securing the Flow: Security and Privacy Tools for Flow-base..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
7
An inclusive Lifecycle Approach for IoT Devices Trust and I..:
, In:
?
2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) ,
8
OPSEC VS Leaked Credentials: Password reuse in Large-Scale ..:
, In:
?
2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) ,
9
TRUSTEE's Framework for DPIAs: Safeguarding personal inform..:
, In:
?
2023 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC) ,
10
Towards building a Self-Sovereign Identity Framework for He..:
, In:
?
2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) ,
11
Architectural Insights into TRUSTEE's Authentication Manage..:
, In:
?
ICC 2023 - IEEE International Conference on Communications ,
12
Enhancing 3GPP CAPIF Authentication and Authorization Acros..:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
13
Improving Network, Data and Application Security for SMEs:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
15