From post

Decentralised Access Control in 802.11 Networks.

, , и . Communications and Multimedia Security, том 3677 из Lecture Notes in Computer Science, стр. 180-190. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Decentralised Access Control in 802.11 Networks., , и . Communications and Multimedia Security, том 3677 из Lecture Notes in Computer Science, стр. 180-190. Springer, (2005)A Wireless Distributed Intrusion Detection System and a New Attack Model., , и . ISCC, стр. 35-40. IEEE Computer Society, (2006)Automatic (Re)Configuration of IT Systems for Dependability., , и . IEEE Trans. Serv. Comput., 4 (2): 110-124 (2011)Ontology and algorithms for the dependable configuration of information systems., , и . Int. J. Crit. Comput. Based Syst., 1 (4): 310-335 (2010)Exploiting Proxy-Based Federated Identity Management in Wireless Roaming Access., , и . TrustBus, том 6863 из Lecture Notes in Computer Science, стр. 13-23. Springer, (2011)The risks with security metrics., , и . QoP, стр. 65-70. ACM, (2008)Dependability in Wireless Networks: Can We Rely on WiFi?, , и . IEEE Secur. Priv., 5 (1): 23-29 (2007)Policy-Driven System Configuration for Dependability., , и . SECURWARE, стр. 420-425. IEEE Computer Society, (2008)The Wireless Opaque Channel to Contrast Information Leakage., , и . WOWMOM, стр. 570-575. IEEE Computer Society, (2005)AMBRA: automated model-based risk analysis., , и . QoP, стр. 43-48. ACM, (2007)