Author of the publication

New E-Payment Scenarios in an Extended Version of the Traditional Model.

, , , and . ICCSA (2), volume 5073 of Lecture Notes in Computer Science, page 514-525. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards self-authenticable smart cards., , , and . Comput. Commun., 29 (15): 2781-2787 (2006)Using Adaptative Encryption for Ubiquitous Environments., , , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 540-548. Springer, (2007)Improving security information gathering with IEEE 802.21 to optimize handover performance., and . MSWiM, page 96-105. ACM, (2009)Nationwide Safety: Nationwide Modeling for Broadband Network Services., , , , , and . IEEE Veh. Technol. Mag., 8 (2): 83-91 (2013)Measuring the resiliency of cellular base station deployments., , , and . WCNC, page 1625-1630. IEEE, (2015)Survey of Attacks and Defenses on P2PSIP Communications., , , and . IEEE Commun. Surv. Tutorials, 14 (3): 750-783 (2012)New E-Payment Scenarios in an Extended Version of the Traditional Model., , , and . ICCSA (2), volume 5073 of Lecture Notes in Computer Science, page 514-525. Springer, (2008)A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol., , , and . ICCSA (4), volume 3483 of Lecture Notes in Computer Science, page 1309-1318. Springer, (2005)Security Issues in Network File Systems., , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 812-820. Springer, (2004)Secure Communications in Multi-Agent Systems Protecting KQML., , , and . WOSIS, page 305-313. INSTICC Press, (2004)