Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Roy, Palash Chandra
.
Introducing an e-Health card for Developing Countries: A case study of Bangladesh
In
Department of Computer and Systems Sciences (DSV)
. Vol. Master thesis. Stockholm University, 2011.
Chen, Hua
, and
Yi Guo
.
"
Fine-grained Security Model of Multi-agent Communication with XML Specifications
."
Journal of Xi'an Technological University
29, no. 1 (2009).
Liu, Baolong
.
XML Security in XML Data Integrity, Authentication, and Confidentiality
In
School of Computing and Engineering
. Vol. Doctor of Philosophy. University of Huddersfield, 2010.
Cheng, Qingfeng
, and
Chunming Tang
.
"
Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round
."
International Journal of Network Security
17, no. 6 (2015): 678-682.
Huang, Li-Chin
, and
Min-Shiang Hwang
.
"
A Conference Key Scheme Based on the Die-Hellman Key Exchange
."
International Journal of Network Security
20, no. 6 (2018): 1221-1226.
Huang, Li-Chin
, and
Min-Shiang Hwang
.
"
A Conference Key Distribution Scheme in Tree Hierarchies
."
International Journal of Network Security
15, no. 1 (2013): 59{64.
Kuldeep, Singh
,
Jøsang Audun
,
Sadek Ferdous
, and
Ravishankar Borgaonkar
.
Spam Filter Optimality Based on Signal Detection Theory
In
2nd international conference on Security of information and networks
. Famagusta, North Cyprus.
Kalech, Meir
,
Sarit Kraus
,
Gal A. Kaminka
, and
Claudia V. Goldman
.
"
Practical voting rules with partial information
."
Autonomous Agents and Multi-Agent Systems
22, no. 1 (2011): 151-182 .
Blosser, Gary
, and
Justin Zhan
.
Privacy-Preserving Collaborative E-Voting
In
International Conference on Intelligence and Security Informatics ISI 2008: Intelligence and Security Informatics
. Berlin, Heidelberg: Springer, 2008.
Kalech, Meir
,
Sarit Kraus
,
Gal A. Kaminka
, and
Claudia V. Goldman
.
Iterative Voting Rules
., 2010.
Adesina, Ademola O.
,
Kehinde K. Agbele
,
Ronald Februarie
,
Ademola P. Abidoye
, and
Henry O. Nyongesa
.
"
Ensuring the security and privacy of information in mobile health-care communication systems
."
South African Journal of Science
107, no. 9-10 (2011).
Tahir, Muhammad Nabeel
.
"
C-RBAC: Contextual role-based access control model
."
Ubiquitous Computing and Communication Journal
2, no. 3 (2007).
Cetinkaya, Orhan
, and
Ali Doganaksoy
.
A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network
In
The Second International Conference on Availability, Reliability and Security (ARES'07)
. Vienna, Austria , 2007.
Rodríguez-Henríquez, F.
,
Daniel Ortiz-Arroyo
, and
Claudia García-Zamora
.
"
Yet another improvement over the Mu–Varadharajan e-voting protocol
."
Computer Standards & Interfaces
29 (2007): 471-480.
Asadpour, Mahdi
, and
Rasool Jalili
.
"
Double Voting Problem of Some Anonymous E-Voting Schemes
."
Journal of Information Science And Engineering
25 (2009): 895-906.
Mateu, Víctor
,
Francesc Sebé
, and
Magda Valls
.
"
Constructing credential-based E-voting systems from offline E-coin protocols
."
Journal of Network and Computer Applications
42 (2014): 39-44.
Baseri, Yaser
,
Amir S. Mortazavi
,
Maryam Rajabzadeh Asaar
,
Mohsen Pourpouneh
, and
Javad Mohajeri
.
"
Double voter perceptible blind signature based electronic voting protocol
."
The ISC International Journal of Information Security
3, no. 1 (2011): 43-50.
García, D.A.López
.
"
A flexible e-voting scheme for debate tools
."
Computers & Security
56 (2016): 50-62.
Çetġnkaya, Orhan
.
Verifiability and Receipt-Freeness in Cryptographic Voting Systems
In
Graduate School Of Applied Mathematics
. Vol. Doctor Of Philosophy In Cryptography. Middle east technical university, 2007.
Jahandideh, Vahid
,
Amir S. Mortazavi
,
Yaser Baseri
, and
Javad Mohajeri
.
"
Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol
."
International Journal of Electronic Governance
39, no. 1 (2010).
Meseguer, Víctor Mateu
.
New approaches for electronic voting paradigms
In
Departament de Matemàtica
. Vol. Doctor. Universitat de Lleida, 2015.
Amman, Jordan
,
Sattar J. Aboud
, and
Mohammad A. Al-Fayoumi
.
E-voting scheme using bilinear pairing
In
7th International Conference on Computer Science and Information Technology (CSIT) (2016)
., 2016.
Hnaity, Omar Al
.
Design Secure E-voting Scheme
In
Department Of Computer Science, Faculty of information technology
. Vol. Master in Computer Science. Amman Jordan: Middle East University, 2008.
Nagare, Anuja P.
.
"
License Plate Character Recognition System using Neural Network
."
International Journal of Computer Applications (0975 – 8887)
25, no. 10 (2011).
Rani, P.Sandhya
, and
Vara Prasad
.
"
License plate character segmentation based on pixel distribution density
."
International journal of engineering science & advanced technology
2, no. 5 (2012): 1539-1542.
Pages
« първа
‹ предишна
…
338
339
340
341
342
343
344
345
346
…
следваща ›
последна »
385199 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all