Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications JinPark, Yong. "Regime formation and consequence: The case of internet security in the East-Asia ‘Four Tigers’ Author links open overlay panel." Government Information Quarterly 26, no. 2 (2009): 398-406. Calvin], Wei-Dar Chen [. Secure e-Payment Portal Solutions Using Mobile Technologies and Citizen Identity Scheme In Department of Mathematics. Vol. Doctor of Philosophy. London: Royal Holloway, University of London, 2013. Mednikarov, Boyan. Naval Education in Bulgaria - Current State and Perspectives (Военноморското образование в Република България - Състояние и перспективи). Варна: Е-литера Софт ЕООД, 2019. Najgebauer, Andrzej, Ryszard Antkiewicz, Dariusz Pierzchata, and Jarostaw Rulka. "The Computational Intelligence Methods for the Armed Forces Capabilities Allocation Problem." In 2018 IEEE Symposium Series on Computational Intelligence (SSCI). Bangalore, India, 2018. Николић, Дејан Ж., Митар Ковач, and Влада М. Митић. "Менаџмент у одбрани – основне функције [Defence Management – Main Functions]." Воjно дело 71, no. 1 (2019): 99-126. Liu, Baolong, Joan Lu, and Jim Yip. "Data Integrity Based on Concatenated Hash Function." (IJCSIS) International Journal of Computer Science and Information Security 1, no. 1 (2009). Liu, Baolong, Joan Lu, and Jim Yip. "A Series-parallel XML Multisignature Scheme for XML Data Authentication." IJCSNS International Journal of Computer Science and Network Security 9, no. 2 (2009). Roy, Palash Chandra. Introducing an e-Health card for Developing Countries: A case study of Bangladesh In Department of Computer and Systems Sciences (DSV). Vol. Master thesis. Stockholm University, 2011. Chen, Hua, and Yi Guo. "Fine-grained Security Model of Multi-agent Communication with XML Specifications." Journal of Xi'an Technological University 29, no. 1 (2009). Liu, Baolong. XML Security in XML Data Integrity, Authentication, and Confidentiality In School of Computing and Engineering. Vol. Doctor of Philosophy. University of Huddersfield, 2010. Cheng, Qingfeng, and Chunming Tang. "Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round." International Journal of Network Security 17, no. 6 (2015): 678-682. Huang, Li-Chin, and Min-Shiang Hwang. "A Conference Key Scheme Based on the Die-Hellman Key Exchange." International Journal of Network Security 20, no. 6 (2018): 1221-1226. Huang, Li-Chin, and Min-Shiang Hwang. "A Conference Key Distribution Scheme in Tree Hierarchies." International Journal of Network Security 15, no. 1 (2013): 59{64. Kuldeep, Singh, Jøsang Audun, Sadek Ferdous, and Ravishankar Borgaonkar. Spam Filter Optimality Based on Signal Detection Theory In 2nd international conference on Security of information and networks. Famagusta, North Cyprus. Kalech, Meir, Sarit Kraus, Gal A. Kaminka, and Claudia V. Goldman. "Practical voting rules with partial information." Autonomous Agents and Multi-Agent Systems 22, no. 1 (2011): 151-182 . Blosser, Gary, and Justin Zhan. Privacy-Preserving Collaborative E-Voting In International Conference on Intelligence and Security Informatics ISI 2008: Intelligence and Security Informatics. Berlin, Heidelberg: Springer, 2008. Kalech, Meir, Sarit Kraus, Gal A. Kaminka, and Claudia V. Goldman. Iterative Voting Rules., 2010. Adesina, Ademola O., Kehinde K. Agbele, Ronald Februarie, Ademola P. Abidoye, and Henry O. Nyongesa. "Ensuring the security and privacy of information in mobile health-care communication systems." South African Journal of Science 107, no. 9-10 (2011). Tahir, Muhammad Nabeel. " C-RBAC: Contextual role-based access control model." Ubiquitous Computing and Communication Journal 2, no. 3 (2007). Cetinkaya, Orhan, and Ali Doganaksoy. A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network In The Second International Conference on Availability, Reliability and Security (ARES'07). Vienna, Austria , 2007. Rodríguez-Henríquez, F., Daniel Ortiz-Arroyo, and Claudia García-Zamora. "Yet another improvement over the Mu–Varadharajan e-voting protocol." Computer Standards & Interfaces 29 (2007): 471-480. Asadpour, Mahdi, and Rasool Jalili. "Double Voting Problem of Some Anonymous E-Voting Schemes." Journal of Information Science And Engineering 25 (2009): 895-906. Mateu, Víctor, Francesc Sebé, and Magda Valls. "Constructing credential-based E-voting systems from offline E-coin protocols." Journal of Network and Computer Applications 42 (2014): 39-44. Baseri, Yaser, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, and Javad Mohajeri. "Double voter perceptible blind signature based electronic voting protocol." The ISC International Journal of Information Security 3, no. 1 (2011): 43-50. García, D.A.López. "A flexible e-voting scheme for debate tools." Computers & Security 56 (2016): 50-62. Pages« първа ‹ предишна … 338 339 340 341 342 343 344 345 346 … следваща › последна »