Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication and Authorisation Prototype on the μgrid for Medical Data Management., , , , and . HealthGrid, volume 112 of Studies in Health Technology and Informatics, page 222-233. IOS Press, (2005)Secure communication for ad-hoc, federated groups., , and . IDtrust, volume 283 of ACM International Conference Proceeding Series, page 48-58. ACM, (2008)S3K: Scalable Security With Symmetric Keys - DTLS Key Establishment for the Internet of Things., , , and . IEEE Trans Autom. Sci. Eng., 13 (3): 1270-1280 (2016)Authorization framework for the Internet-of-Things., , and . WOWMOM, page 1-6. IEEE Computer Society, (2013)Authentication and Authorization for IoT Devices in Disadvantaged Environments., , , and . WF-IoT, page 368-373. IEEE, (2019)Key Management for Encrypted Data Storage in Distributed Systems., , and . IEEE Security in Storage Workshop, page 20-30. IEEE Computer Society, (2003)Object Security for Constrained RESTful Environments (OSCORE)., , , and . RFC, (July 2019)New paradigms for access control in constrained environments., , , , and . ReCoSoC, page 1-4. IEEE, (2014)A Classification of Delegation Schemes for Attribute Authority., , and . Formal Aspects in Security and Trust, volume 4691 of Lecture Notes in Computer Science, page 158-169. Springer, (2006)Robust and Scalable DTLS Session Establishment., , and . ERCIM News, (2016)