Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Covert communications through network configuration messages., , and . Comput. Secur., (2013)HIDE_DHCP: Covert Communications through Network Configuration Messages., , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 162-173. Springer, (2012)Edge-Assisted Vehicular Networks Security., , , and . IEEE Internet of Things Journal, 6 (5): 8038-8045 (2019)Personal IoT Privacy Control at the Edge., , , and . IEEE Secur. Priv., 20 (1): 23-32 (2022)Integration of non-repudiation services in mobile DRM scenarios., , , , and . Telecommun. Syst., 35 (3-4): 161-176 (2007)Immune System for the Internet of Things Using Edge Technologies., , , and . IEEE Internet of Things Journal, 6 (3): 4774-4781 (2019)Non-repudiation protocols for multiple entities., , and . Comput. Commun., 27 (16): 1608-1616 (2004)Agent-mediated non-repudiation protocols., , , and . Electron. Commer. Res. Appl., 3 (2): 152-162 (2004)From SMOG to Fog: A security perspective., , , and . FMEC, page 56-61. IEEE, (2017)Optimized multi-party certified email protocols., , and . Inf. Manag. Comput. Security, 13 (5): 350-366 (2005)