Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

INRISCO: INcident monitoRing in Smart COmmunities., , , , , , , , , and 6 other author(s). IEEE Access, (2020)Satellite assisted underwater radio communication for emergency services., and . CTS, page 541-544. IEEE, (2014)Secure Ad-Hoc mBusiness: EnhancingWindowsCE Security., , and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 90-99. Springer, (2004)Implementing DNSSEC soft delegation for microservices., , , , , and . Electron. Commun. Eur. Assoc. Softw. Sci. Technol., (2022)TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications., , , , and . IEEE Commun. Surv. Tutorials, 21 (4): 3502-3531 (2019)Smart card-based agents for fair non-repudiation., , , , and . Comput. Networks, 51 (9): 2288-2298 (2007)Comparing Password Management Software: Toward Usable and Secure Enterprise Authentication., , , , and . IT Prof., 18 (5): 34-40 (2016)DNS-Based Dynamic Authentication for Microservices in IoT., , , and . UCAmI, volume 2 of MDPI Proceedings, page 1233. MDPI, (2018)A Smart Card Solution for Access Control and Trust Management for Nomadic Users., , and . CARDIS, volume 3928 of Lecture Notes in Computer Science, page 62-77. Springer, (2006)PDP and GSDL: A New Service Discovery Middleware to Support Spontaneous Interactions in Pervasive Systems., , , , and . PerCom Workshops, page 178-182. IEEE Computer Society, (2005)