Search results for: Costas Lambrinoudakis
Journal of Forensic Sciences > 69 > 1 > 117 - 130
Journal of Forensic Sciences > 68 > 6 > 2002 - 2011
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Authentication, Authorization and Access Control > 59-68
Journal of Corporate Finance > 2016 > 38 > C > 166-195
Lecture Notes in Computer Science > Trust and Trustworthy Computing > Socio-Economic Strand > 298-307
Lecture Notes in Computer Science > Transactions on Large-Scale Data- and Knowledge-Centered Systems I > 191-210
Lecture Notes in Computer Science > Computer Network Security > Mathematical Models and Architectures for Computer Network Security > 112-121
Lecture Notes in Computer Science > Computer Safety, Reliability, and Security > Dependability of Critical Infrastructures > 331-341
Lecture Notes in Computer Science > Electronic Government and the Information Systems Perspective > E-Government Services and Web 2.0 (I) > 142-149
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Prevention Systems > 38-44
Lecture Notes in Computer Science > Computer Network Security > Mathematical Models and Architectures for Computer Network Security > 100-111
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 5: Privacy Enhancing Technologies > 207-222
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Communications in Computer and Information Science > Secure and Trust Computing, Data Management, and Applications > 190-197
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Next Generation Society. Technological and Legal Issues > Session 6: Security, Attacks and Crime > 220-235