Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Николић, Дејан Ж.
,
Митар Ковач
, and
Влада М. Митић
.
"
Менаџмент у одбрани – основне функције [Defence Management – Main Functions]
."
Воjно дело
71, no. 1 (2019): 99-126.
Liu, Baolong
,
Joan Lu
, and
Jim Yip
.
"
Data Integrity Based on Concatenated Hash Function
."
(IJCSIS) International Journal of Computer Science and Information Security
1, no. 1 (2009).
Liu, Baolong
,
Joan Lu
, and
Jim Yip
.
"
A Series-parallel XML Multisignature Scheme for XML Data Authentication
."
IJCSNS International Journal of Computer Science and Network Security
9, no. 2 (2009).
Roy, Palash Chandra
.
Introducing an e-Health card for Developing Countries: A case study of Bangladesh
In
Department of Computer and Systems Sciences (DSV)
. Vol. Master thesis. Stockholm University, 2011.
Chen, Hua
, and
Yi Guo
.
"
Fine-grained Security Model of Multi-agent Communication with XML Specifications
."
Journal of Xi'an Technological University
29, no. 1 (2009).
Liu, Baolong
.
XML Security in XML Data Integrity, Authentication, and Confidentiality
In
School of Computing and Engineering
. Vol. Doctor of Philosophy. University of Huddersfield, 2010.
Cheng, Qingfeng
, and
Chunming Tang
.
"
Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round
."
International Journal of Network Security
17, no. 6 (2015): 678-682.
Huang, Li-Chin
, and
Min-Shiang Hwang
.
"
A Conference Key Scheme Based on the Die-Hellman Key Exchange
."
International Journal of Network Security
20, no. 6 (2018): 1221-1226.
Huang, Li-Chin
, and
Min-Shiang Hwang
.
"
A Conference Key Distribution Scheme in Tree Hierarchies
."
International Journal of Network Security
15, no. 1 (2013): 59{64.
Kuldeep, Singh
,
Jøsang Audun
,
Sadek Ferdous
, and
Ravishankar Borgaonkar
.
Spam Filter Optimality Based on Signal Detection Theory
In
2nd international conference on Security of information and networks
. Famagusta, North Cyprus.
Kalech, Meir
,
Sarit Kraus
,
Gal A. Kaminka
, and
Claudia V. Goldman
.
"
Practical voting rules with partial information
."
Autonomous Agents and Multi-Agent Systems
22, no. 1 (2011): 151-182 .
Blosser, Gary
, and
Justin Zhan
.
Privacy-Preserving Collaborative E-Voting
In
International Conference on Intelligence and Security Informatics ISI 2008: Intelligence and Security Informatics
. Berlin, Heidelberg: Springer, 2008.
Kalech, Meir
,
Sarit Kraus
,
Gal A. Kaminka
, and
Claudia V. Goldman
.
Iterative Voting Rules
., 2010.
Adesina, Ademola O.
,
Kehinde K. Agbele
,
Ronald Februarie
,
Ademola P. Abidoye
, and
Henry O. Nyongesa
.
"
Ensuring the security and privacy of information in mobile health-care communication systems
."
South African Journal of Science
107, no. 9-10 (2011).
Tahir, Muhammad Nabeel
.
"
C-RBAC: Contextual role-based access control model
."
Ubiquitous Computing and Communication Journal
2, no. 3 (2007).
Cetinkaya, Orhan
, and
Ali Doganaksoy
.
A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network
In
The Second International Conference on Availability, Reliability and Security (ARES'07)
. Vienna, Austria , 2007.
Rodríguez-Henríquez, F.
,
Daniel Ortiz-Arroyo
, and
Claudia García-Zamora
.
"
Yet another improvement over the Mu–Varadharajan e-voting protocol
."
Computer Standards & Interfaces
29 (2007): 471-480.
Asadpour, Mahdi
, and
Rasool Jalili
.
"
Double Voting Problem of Some Anonymous E-Voting Schemes
."
Journal of Information Science And Engineering
25 (2009): 895-906.
Mateu, Víctor
,
Francesc Sebé
, and
Magda Valls
.
"
Constructing credential-based E-voting systems from offline E-coin protocols
."
Journal of Network and Computer Applications
42 (2014): 39-44.
Baseri, Yaser
,
Amir S. Mortazavi
,
Maryam Rajabzadeh Asaar
,
Mohsen Pourpouneh
, and
Javad Mohajeri
.
"
Double voter perceptible blind signature based electronic voting protocol
."
The ISC International Journal of Information Security
3, no. 1 (2011): 43-50.
García, D.A.López
.
"
A flexible e-voting scheme for debate tools
."
Computers & Security
56 (2016): 50-62.
Çetġnkaya, Orhan
.
Verifiability and Receipt-Freeness in Cryptographic Voting Systems
In
Graduate School Of Applied Mathematics
. Vol. Doctor Of Philosophy In Cryptography. Middle east technical university, 2007.
Jahandideh, Vahid
,
Amir S. Mortazavi
,
Yaser Baseri
, and
Javad Mohajeri
.
"
Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol
."
International Journal of Electronic Governance
39, no. 1 (2010).
Meseguer, Víctor Mateu
.
New approaches for electronic voting paradigms
In
Departament de Matemàtica
. Vol. Doctor. Universitat de Lleida, 2015.
Amman, Jordan
,
Sattar J. Aboud
, and
Mohammad A. Al-Fayoumi
.
E-voting scheme using bilinear pairing
In
7th International Conference on Computer Science and Information Technology (CSIT) (2016)
., 2016.
Pages
« първа
‹ предишна
…
338
339
340
341
342
343
344
345
346
…
следваща ›
последна »
471050 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all