Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Correia, Pedro Miguel Alv
, and
Inês Oliveira A. de Jesus
.
"
Combate às transferências bancárias ilegítimas pela Internet no direito português: entre as experiências domésticas e políticas globais concertadas
."
Revista Direito GV
12, no. 2 (2016).
Mehmet, Murad
, and
Duminda Wijesekera
.
"
Ontological Constructs to Create Money Laundering Schemes
." In
STIDS 2010 Proceedings
., 2010.
Dumitrache, AA
,
A Boroi
, and
F Pusca
.
Recent technological tendencies of money laundering
In
Annals of DAAAM & Proceedings
. Vienna: DAAAM International, 2011.
Tsakalidis, George
.
Camco a framework for classification, analysis & monitoring cybercrime-related offences
. Vol. Master’s Thesis. University of Macedonia, 2016.
Romani, Alessia
.
Money laundering and financial crimes: a comparison between criminal and legal firms
In
Dipartimento di Scienze Economiche
. Vol. Magistrale in Business Administration. Universita‟ Degli Studi Di Padova , 2016.
Onyeagba, Justus B. C.
, and
Ilokanulo N. Samuel
.
"
Impact of Cashless Banking System of Payment on Entrepreneurial Activities in Anambra State
."
IJMPAS
1, no. 2 (2015).
Cheng, Zi-Yao
,
Yun Liu
,
Chin-Chen Chang
, and
Chen-Xu Liu
.
"
A Novel Biometric-Based Remote User Authentication Scheme Using Quadratic Residues
."
International Journal of Information and Electronics Engineering
3, no. 4 (2013).
Amin, Ruhul
,
SK Hafizul Islam
,
Arijit Karati
, and
G. P. Biswas
.
"
Design of an enhanced authentication protocol and its verification using AVISPA
." In
3rd International Conference on Recent Advances in Information Technology (RAIT)
. Dhanbad, India , 2016.
Park, Hyun-A
,
JaeHyun Park
,
JaeTark Choi
, and
DongHoon Lee
.
Toward an integrated system between cloud computing and smartcard application
In
5th International Conference on Computer Sciences and Convergence Information Technology
. Seoul, South Korea , 2010.
Jali, Mohd Zalisham
,
Shaharudin Ismail
, and
Zul Hilmi Abdullah
.
"
An Assessment on the Password Practices Among Students
."
Journal of Theoretical and Applied Information Technology
66, no. 3 (2014).
Cheng, Zi-Yao
,
Yun Liu
,
Chin-Chen Chang
, and
Shih-Chang Chang
.
An Improved Protocol for Password Authentication Using Smart Cards
., 2011.
Gaurav, Jayesh
,
Sanjive Tyagi
, and
Jayanthi Ranjan
.
"
Smart Card Fraud Prevention Scheme Using Fingerprinting Authentication
."
International Journal of Computer Science and Information Technologies
3, no. 1 (2012): 3059-3062.
Hadi, Raghad Mohammed
.
"
Security protocol for a remote user authentication system over unsecure network
."
Science articles exchange (مقالات العلوم الصرف)
18, no. 76 (2012).
Kumari, Anju
,
Deepti Tamhane
,
Komal Rani
, and
Ashwini Walunj
.
"
Credit Card Fraud Detection Using Biometric Fingerprint Authentication
."
IJSART
4, no. 12 (2018).
Ali, Muhammad Helmi
, and
Eddie Shahril Ismail
.
"
Password authentication scheme based on the quadratic residue problem
."
AIP Conference Proceedings
1830, no. 1 (2017).
Gaydarski, Ivan
, and
Zlatogor Minchev
.
Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2019.
Dang, Tran Khanh
.
"
Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
." In
Information Resources Management: Concepts, Methodologies, Tools and Applications
, 693-710. IGI Global, 2010.
Nguyen, Viet Hung
, and
Tran Khanh Dang
.
"
A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases
."
Journal of Software
3, no. 4 (2008).
Nguyen, Viet Hung
,
Tran Khanh Dang
,
Nguyen Thanh Son
, and
Josef Kung
.
"
Query Assurance Verification for Dynamic Outsourced XML Databases
." In
The Second International Conference on Availability, Reliability and Security (ARES'07)
. Vienna, Austria , 2007.
Wohlgemuth, Sven
,
Isao Echizen
, and
Noboru Sonehara
.
"
On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking
."
Journal of Information Hiding and Multimedia Signal Processing
2, no. 3 (2011).
Dang, Tran Khanh
.
"
Security Issues in Outsourced XML Databases
." In
Open and Novel Issues in XML Database Applications: Future Directions and Advanced Technologies
, 231-261. IGI Global, 2009.
Dang, Tran Khanh
, and
Nguyen Thanh Son
.
"
Providing Query Assurance for Outsourced Tree-Indexed Data
." In
Modeling, Simulation and Optimization of Complex Processes
. Berlin, Heidelberg: Springer, 2008.
Heurix, Johannes
, and
Thomas Neubauer
.
"
On the Security of Outsourced and Untrusted Databases
." In
IEEE/ACIS 9th International Conference on Computer and Information Science
. Yamagata, Japan , 2010.
Raybourn, Tracey
.
Bucketization Techniques for encrypted databases: Quantifying the impact of Query Distributions
In
Graduate College of Bowling Green State University
. Vol. Master of Science., 2013.
Zhang, Yong Hua
.
"
Anonymity Query Method of Outsourced Database
."
Advanced Materials Research
798-799 (2013): 837-841.
Pages
« първа
‹ предишна
…
347
348
349
350
351
352
353
354
355
…
следваща ›
последна »
372532 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance