Author of the publication

Multimedia Copyright Protection Platform Demonstrator.

, , , , , , and . iTrust, volume 3477 of Lecture Notes in Computer Science, page 411-414. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reconciling privacy and efficient utility management in smart cities., , , , and . Trans. Emerg. Telecommun. Technol., 25 (1): 94-108 (2014)Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm., , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 526-539. Springer, (2007)Providing k-anonymity and revocation in ubiquitous VANETs., , , , and . Ad Hoc Networks, (2016)Privacy risk analysis in the IoT domain., , , , , and . GIoTS, page 1-6. IEEE, (2018)Energy Efficiency of Load Balancing in MANET Routing Protocols., , and . SNPD, page 476-483. IEEE Computer Society, (2005)Multimedia Copyright Protection Platform Demonstrator., , , , , , and . iTrust, volume 3477 of Lecture Notes in Computer Science, page 411-414. Springer, (2005)Low-Power Low-Rate Goes Long-Range: The Case for Secure and Cooperative Machine-to-Machine Communications., , , , and . Networking Workshops, volume 6827 of Lecture Notes in Computer Science, page 219-230. Springer, (2011)Secure Lossless Aggregation Over Fading and Shadowing Channels for Smart Grid M2M Networks., , , , , and . IEEE Trans. Smart Grid, 2 (4): 844-864 (2011)DocCloud: A document recommender system on cloud computing with plausible deniability., , , and . Inf. Sci., (2014)Managing Privacy in the Internet of Things: DocCloud, a Use Case., , , and . Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, Springer, (2015)