Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Dezhu, Dai
.
"
On the particularity of privacy and legislative issues in e-government (论电子政务中的特殊性隐私及其立法问题)
."
Theoretical Monthly
7 (2009): 103-106.
Warf, Barney
.
E-Government in Asia: Origins, Politics, Impacts, Geographies
. Chandos Publishing, 2016.
JinPark, Yong
.
"
Regime formation and consequence: The case of internet security in the East-Asia ‘Four Tigers’ Author links open overlay panel
."
Government Information Quarterly
26, no. 2 (2009): 398-406.
Calvin], Wei-Dar Chen [
.
Secure e-Payment Portal Solutions Using Mobile Technologies and Citizen Identity Scheme
In
Department of Mathematics
. Vol. Doctor of Philosophy. London: Royal Holloway, University of London, 2013.
Mednikarov, Boyan
.
Naval Education in Bulgaria - Current State and Perspectives (Военноморското образование в Република България - Състояние и перспективи)
. Варна: Е-литера Софт ЕООД, 2019.
Najgebauer, Andrzej
,
Ryszard Antkiewicz
,
Dariusz Pierzchata
, and
Jarostaw Rulka
.
"
The Computational Intelligence Methods for the Armed Forces Capabilities Allocation Problem
." In
2018 IEEE Symposium Series on Computational Intelligence (SSCI)
. Bangalore, India, 2018.
Николић, Дејан Ж.
,
Митар Ковач
, and
Влада М. Митић
.
"
Менаџмент у одбрани – основне функције [Defence Management – Main Functions]
."
Воjно дело
71, no. 1 (2019): 99-126.
Liu, Baolong
,
Joan Lu
, and
Jim Yip
.
"
Data Integrity Based on Concatenated Hash Function
."
(IJCSIS) International Journal of Computer Science and Information Security
1, no. 1 (2009).
Liu, Baolong
,
Joan Lu
, and
Jim Yip
.
"
A Series-parallel XML Multisignature Scheme for XML Data Authentication
."
IJCSNS International Journal of Computer Science and Network Security
9, no. 2 (2009).
Roy, Palash Chandra
.
Introducing an e-Health card for Developing Countries: A case study of Bangladesh
In
Department of Computer and Systems Sciences (DSV)
. Vol. Master thesis. Stockholm University, 2011.
Chen, Hua
, and
Yi Guo
.
"
Fine-grained Security Model of Multi-agent Communication with XML Specifications
."
Journal of Xi'an Technological University
29, no. 1 (2009).
Liu, Baolong
.
XML Security in XML Data Integrity, Authentication, and Confidentiality
In
School of Computing and Engineering
. Vol. Doctor of Philosophy. University of Huddersfield, 2010.
Cheng, Qingfeng
, and
Chunming Tang
.
"
Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round
."
International Journal of Network Security
17, no. 6 (2015): 678-682.
Huang, Li-Chin
, and
Min-Shiang Hwang
.
"
A Conference Key Scheme Based on the Die-Hellman Key Exchange
."
International Journal of Network Security
20, no. 6 (2018): 1221-1226.
Huang, Li-Chin
, and
Min-Shiang Hwang
.
"
A Conference Key Distribution Scheme in Tree Hierarchies
."
International Journal of Network Security
15, no. 1 (2013): 59{64.
Kuldeep, Singh
,
Jøsang Audun
,
Sadek Ferdous
, and
Ravishankar Borgaonkar
.
Spam Filter Optimality Based on Signal Detection Theory
In
2nd international conference on Security of information and networks
. Famagusta, North Cyprus.
Kalech, Meir
,
Sarit Kraus
,
Gal A. Kaminka
, and
Claudia V. Goldman
.
"
Practical voting rules with partial information
."
Autonomous Agents and Multi-Agent Systems
22, no. 1 (2011): 151-182 .
Blosser, Gary
, and
Justin Zhan
.
Privacy-Preserving Collaborative E-Voting
In
International Conference on Intelligence and Security Informatics ISI 2008: Intelligence and Security Informatics
. Berlin, Heidelberg: Springer, 2008.
Kalech, Meir
,
Sarit Kraus
,
Gal A. Kaminka
, and
Claudia V. Goldman
.
Iterative Voting Rules
., 2010.
Adesina, Ademola O.
,
Kehinde K. Agbele
,
Ronald Februarie
,
Ademola P. Abidoye
, and
Henry O. Nyongesa
.
"
Ensuring the security and privacy of information in mobile health-care communication systems
."
South African Journal of Science
107, no. 9-10 (2011).
Tahir, Muhammad Nabeel
.
"
C-RBAC: Contextual role-based access control model
."
Ubiquitous Computing and Communication Journal
2, no. 3 (2007).
Cetinkaya, Orhan
, and
Ali Doganaksoy
.
A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network
In
The Second International Conference on Availability, Reliability and Security (ARES'07)
. Vienna, Austria , 2007.
Rodríguez-Henríquez, F.
,
Daniel Ortiz-Arroyo
, and
Claudia García-Zamora
.
"
Yet another improvement over the Mu–Varadharajan e-voting protocol
."
Computer Standards & Interfaces
29 (2007): 471-480.
Asadpour, Mahdi
, and
Rasool Jalili
.
"
Double Voting Problem of Some Anonymous E-Voting Schemes
."
Journal of Information Science And Engineering
25 (2009): 895-906.
Mateu, Víctor
,
Francesc Sebé
, and
Magda Valls
.
"
Constructing credential-based E-voting systems from offline E-coin protocols
."
Journal of Network and Computer Applications
42 (2014): 39-44.
Pages
« първа
‹ предишна
…
338
339
340
341
342
343
344
345
346
…
следваща ›
последна »
372486 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance