Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Mobile Devices into Semantic Services Environments, , and . Proceedings of the 2008 The Fourth International Conference on Wireless and Mobile Communications, page 137--143. Washington, DC, USA, IEEE Computer Society, (2008)License Transfer Mechanisms through Seamless SIM Authentication - Rights Management based on SIM Keys., , and . WINSYS, page 333-338. INSTICC Press, (2006)Building Trustable Remote Monitoring and Management Systems., , and . UCC Companion, page 213-219. IEEE, (2018)Privacy Labelling and the Story of Princess Privacy and the Seven Helpers., , , , , , , , and . CoRR, (2020)A Methodology for Security Classification applied to Smart Grid Infrastructures., , , and . Int. J. Crit. Infrastructure Prot., (2020)Sociality brings Security in Content Sharing., , , and . J. Comput., 5 (12): 1839-1846 (2010)Security and Privacy Functionalities in IoT., , and . PST, page 1-12. IEEE, (2019)Semantically supported Authentication and Privacy in Social Networks., , , and . SECURWARE, page 83-88. IEEE Computer Society, (2007)SemID: Combining Semantics with Identity Management., , , and . SECURWARE, page 18-23. IEEE Computer Society, (2007)White Paper on 6G Drivers and the UN SDGs., , , , , , , , , and 22 other author(s). CoRR, (2020)