Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Secure TCP/IP Profile in 61850 Based Substation Automation System for Smart Grids., , , , and . IJDSN, 12 (4): 5793183:1-5793183:11 (2016)A H.264 SVC distributed content protection system with flexible key stream generation., , , , and . ICCE-Berlin, page 66-70. IEEE, (2012)Multi-device Single Sign-on for cloud service continuity., , , , and . ICCE, page 644-645. IEEE, (2012)Enhancing privacy and dynamic federation in IdM for consumer cloud computing., , , , and . IEEE Trans. Consumer Electronics, 58 (1): 95-103 (2012)Enhancing privacy and dynamic federation in IdM for consumer cloud computing., , , , and . IEEE Trans. Consumer Electronics, 58 (1): 95-103 (2012)Flexible Computing for personal electronic devices., , , , and . ICCE, page 212-213. IEEE, (2013)How costly are secure transactions on handheld devices?, , , , and . ICCE, page 218-219. IEEE, (2013)A Study of Learning-by-Doing in MOOCs through the Integration of Third-Party External Tools: Comparison of Synchronous and Asynchronous Running Modes., , , , , , , , , and 1 other author(s). J. Univers. Comput. Sci., 24 (8): 1015-1033 (2018)Enhancing the anonymity and auditability of whistleblowers protection, , , , , and . (2022)"I don't see why I would ever want to use it": Analyzing the Usability of Popular Smartphone Password Managers., , , , , and . ACM Conference on Computer and Communications Security, page 1937-1953. ACM, (2019)