Author of the publication

Context-aware security and secure context-awareness in ubiquitous computing environments.

, and . Annales UMCS, Informatica, 4 (1): 332-348 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Product Tracking in Supply Chain., , and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 351-370. Springer, (2012)Security for Next-Gen Analytics for Cross-Organisation Collaboration., , and . SECRYPT, page 604-609. SCITEPRESS, (2023)Towards User Authentication Flexibility., and . SECRYPT, page 59-66. INSTICC Press, (2007)Access Control in Mobile and Ubiquitous Environments., , and . Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability, IGI Global, (2009)Fuzzy Distributed Workflows for Crisis Management Decision Makers., , and . EuroISI, volume 5376 of Lecture Notes in Computer Science, page 226-236. Springer, (2008)PPL v2.0: Uniform Data Access and Usage Control on Cloud and Mobile., , , and . TELERISE@ICSE, page 2-7. IEEE Computer Society, (2015)Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and Inference., , , and . ICETE (2), page 313-320. SciTePress, (2018)Dynamic Context-Aware Access Control - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies., and . SECRYPT, page 386-393. INSTICC Press, (2007)Security for Distributed Machine Learning., , and . SECRYPT, page 838-843. SCITEPRESS, (2023)Security for Distributed Deep Neural Networks: Towards Data Confidentiality & Intellectual Property Protection., , , and . ICETE (2), page 439-447. SciTePress, (2019)