Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Technologies for Mobile Services: The MobiLife Book, , , , , , , , , and 6 other author(s). chapter 6. Privacy, Trust and Group Communications, John Wiley & Sons, (October 2007)Interconnection Security Standards - We Are All Connected.. J. ICT Stand., 4 (1): 1-18 (2016)Providing for privacy in a network infrastructure protection context., and . ICIN, page 79-86. IEEE, (2017)Roaming Interface Signaling Security for LTE Networks., , and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 204-217. Springer, (2018)Experiences in Trusted Cloud Computing., , and . J. ICT Stand., 6 (3): 263-278 (2018)Context-aware Group Management in Mobile Environments, , , , , , , , , and 2 other author(s). Proceedings of the 14th IST Mobile & Wireless Communications Summit, page 1-6. Dresden, Germany, (June 2005)Mobile Payment Solutions., and . I3E, volume 202 of IFIP Conference Proceedings, page 629-642. Kluwer, (2001)Context-aware Group Management in Mobile Environments, , , , , , , , , and 2 other author(s). IST Summit 2005, Dresden, (2005)User location tracking attacks for LTE networks using the interworking functionality., , and . Networking, page 315-322. IEEE Computer Society, (2016)We know where you are!, , , and . CyCon, page 277-293. IEEE, (2016)