Author of the publication

Evidence Gathering for Remuneration of Shared Connections.

, , , and . CNSR, page 569-576. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Accountability in the Cloud via Sticky Policies., , and . STA Workshops, volume 187 of Communications in Computer and Information Science, page 146-155. Springer, (2011)WAKE: Key management scheme for wide-area measurement systems in smart grid., , , and . IEEE Communications Magazine, 51 (1): 34-41 (2013)Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation., , and . TrustBus, volume 6264 of Lecture Notes in Computer Science, page 153-164. Springer, (2010)Selling multimedia resources in ad hoc networks., and . IEEE Communications Magazine, 46 (2): 126-131 (2008)Enforcing Sticky Policies with TPM and Virtualization., and . INTRUST, volume 7222 of Lecture Notes in Computer Science, page 32-47. Springer, (2011)Generating certification authority authenticated public keys in ad hoc networks., , and . Secur. Commun. Networks, 5 (1): 87-106 (2012)Identification in Infrastructureless Networks., and . ESAS, volume 4357 of Lecture Notes in Computer Science, page 58-69. Springer, (2006)Evidence Gathering for Remuneration of Shared Connections., , , and . CNSR, page 569-576. IEEE Computer Society, (2008)