Author of the publication

Identity and Trust Management Directions for User Controlled Light-Path Establishment.

, , , , and . SOAS, volume 135 of Frontiers in Artificial Intelligence and Applications, page 356-364. IOS Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy in Content Distribution Networks.. SEC, volume 250 of IFIP Conference Proceedings, page 435-440. Kluwer, (2003)Fast authentication methods for handovers between IEEE 802.11 wireless LANs., , , , , and . WMASH, page 51-60. ACM, (2004)Enhancing Face Recognition with Location Information., and . ARES, page 397-403. IEEE Computer Society, (2008)Context sensitive access control., , , , and . SACMAT, page 111-119. ACM, (2005)Trusted Directory Services for Secure Internet Connectivity: Transport Layer Security using DNSSEC., , , and . STM@ESORICS, volume 197 of Electronic Notes in Theoretical Computer Science, page 91-103. Elsevier, (2007)Context Sensitive Adaptive Authentication., , , , and . EuroSSC, volume 4793 of Lecture Notes in Computer Science, page 93-109. Springer, (2007)Identity and Trust Management Directions for User Controlled Light-Path Establishment., , , , and . SOAS, volume 135 of Frontiers in Artificial Intelligence and Applications, page 356-364. IOS Press, (2005)Using Identity Management and Secure DNS for Effective and Trusted User Controlled Light-Path Establishment., , , , , and . ICNS, page 79. IEEE Computer Society, (2006)