Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Dumitrache, AA, A Boroi, and F Pusca. Recent technological tendencies of money laundering In Annals of DAAAM & Proceedings. Vienna: DAAAM International, 2011. Tsakalidis, George. Camco a framework for classification, analysis & monitoring cybercrime-related offences. Vol. Master’s Thesis. University of Macedonia, 2016. Romani, Alessia. Money laundering and financial crimes: a comparison between criminal and legal firms In Dipartimento di Scienze Economiche. Vol. Magistrale in Business Administration. Universita‟ Degli Studi Di Padova , 2016. Onyeagba, Justus B. C., and Ilokanulo N. Samuel. "Impact of Cashless Banking System of Payment on Entrepreneurial Activities in Anambra State." IJMPAS 1, no. 2 (2015). Cheng, Zi-Yao, Yun Liu, Chin-Chen Chang, and Chen-Xu Liu. "A Novel Biometric-Based Remote User Authentication Scheme Using Quadratic Residues." International Journal of Information and Electronics Engineering 3, no. 4 (2013). Amin, Ruhul, SK Hafizul Islam, Arijit Karati, and G. P. Biswas. "Design of an enhanced authentication protocol and its verification using AVISPA." In 3rd International Conference on Recent Advances in Information Technology (RAIT). Dhanbad, India , 2016. Park, Hyun-A, JaeHyun Park, JaeTark Choi, and DongHoon Lee. Toward an integrated system between cloud computing and smartcard application In 5th International Conference on Computer Sciences and Convergence Information Technology. Seoul, South Korea , 2010. Jali, Mohd Zalisham, Shaharudin Ismail, and Zul Hilmi Abdullah. "An Assessment on the Password Practices Among Students." Journal of Theoretical and Applied Information Technology 66, no. 3 (2014). Cheng, Zi-Yao, Yun Liu, Chin-Chen Chang, and Shih-Chang Chang. An Improved Protocol for Password Authentication Using Smart Cards., 2011. Gaurav, Jayesh, Sanjive Tyagi, and Jayanthi Ranjan. "Smart Card Fraud Prevention Scheme Using Fingerprinting Authentication." International Journal of Computer Science and Information Technologies 3, no. 1 (2012): 3059-3062. Hadi, Raghad Mohammed. "Security protocol for a remote user authentication system over unsecure network." Science articles exchange (مقالات العلوم الصرف) 18, no. 76 (2012). Kumari, Anju, Deepti Tamhane, Komal Rani, and Ashwini Walunj. "Credit Card Fraud Detection Using Biometric Fingerprint Authentication." IJSART 4, no. 12 (2018). Ali, Muhammad Helmi, and Eddie Shahril Ismail. "Password authentication scheme based on the quadratic residue problem." AIP Conference Proceedings 1830, no. 1 (2017). Gaydarski, Ivan, and Zlatogor Minchev. Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2019. Dang, Tran Khanh. "Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data." In Information Resources Management: Concepts, Methodologies, Tools and Applications, 693-710. IGI Global, 2010. Nguyen, Viet Hung, and Tran Khanh Dang. "A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases." Journal of Software 3, no. 4 (2008). Nguyen, Viet Hung, Tran Khanh Dang, Nguyen Thanh Son, and Josef Kung. "Query Assurance Verification for Dynamic Outsourced XML Databases." In The Second International Conference on Availability, Reliability and Security (ARES'07). Vienna, Austria , 2007. Wohlgemuth, Sven, Isao Echizen, and Noboru Sonehara. "On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking." Journal of Information Hiding and Multimedia Signal Processing 2, no. 3 (2011). Dang, Tran Khanh. "Security Issues in Outsourced XML Databases." In Open and Novel Issues in XML Database Applications: Future Directions and Advanced Technologies, 231-261. IGI Global, 2009. Dang, Tran Khanh, and Nguyen Thanh Son. "Providing Query Assurance for Outsourced Tree-Indexed Data." In Modeling, Simulation and Optimization of Complex Processes. Berlin, Heidelberg: Springer, 2008. Heurix, Johannes, and Thomas Neubauer. "On the Security of Outsourced and Untrusted Databases." In IEEE/ACIS 9th International Conference on Computer and Information Science. Yamagata, Japan , 2010. Raybourn, Tracey. Bucketization Techniques for encrypted databases: Quantifying the impact of Query Distributions In Graduate College of Bowling Green State University. Vol. Master of Science., 2013. Zhang, Yong Hua. "Anonymity Query Method of Outsourced Database." Advanced Materials Research 798-799 (2013): 837-841. .W.T.Ngai, E, , Y.H.Wong, , and . "The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature." Decision Support Systems 50, no. 3 (2011): 559-569. T.S.Quah, Jon, and M.Sriganesh. "Real-time credit card fraud detection using computational intelligence." Expert Systems with Applications 35, no. 4 (2008): 1721-1732. Pages« първа ‹ предишна … 347 348 349 350 351 352 353 354 355 … следваща › последна »