Author of the publication

Designing Security Protocols Adapted to the Constraints of Mobile Environments.

, , , and . EUC, page 624-629. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure collaborative web based environment for virtual organizations., , , and . ICDIM, page 723-730. IEEE, (2007)Implementation of a formal security policy refinement process in WBEM architecture., , , and . LANOMS, page 65-76. UFRGS, (2005)An organizational pattern for contributing to the deployment of secure Virtual Enterprises., , , and . Security and Management, page 56-61. CSREA Press, (2009)A best practices-oriented approach for establishing trust chains within Virtual Organisations., , , and . EDOCW, page 167-174. IEEE Computer Society, (2008)A trust-based virtual collaborative environment., , , and . J. Digit. Inf. Manag., 6 (5): 405-413 (2008)Automated Creation of Inter-organizational Grid Virtual Organizations., , , , and . NOMS, IEEE, (2006)Dynamic Creation of Inter-Organizational Grid Virtual Organizations., , , , and . e-Science, page 405-412. IEEE Computer Society, (2005)Implementation of a Formal Security Policy Refinement Process in WBEM Architecture., , , and . J. Netw. Syst. Manag., 15 (2): 241-266 (2007)PEP = Point to Enhance Particularly., , , and . POLICY, page 93-96. IEEE Computer Society, (2008)A secure collaborative web-based environment for virtual organisations., , , , and . Int. J. Web Based Communities, 5 (2): 273-292 (2009)