Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Chips for an On-Line Casino., , , and . ITCC (1), page 494-499. IEEE Computer Society, (2005)Access control with safe role assignment for mobile agents., , , and . AAMAS, page 1235-1236. ACM, (2005)Protecting On-Line Casinos against Fraudulent Player Drop-Out., , , , , , and . ITCC (1), page 500-505. IEEE Computer Society, (2005)An Implementation of Self-Protected Mobile Agents., , and . ECBS, page 544-549. IEEE Computer Society, (2004)Protecting Mobile Agent Loops., , , , and . MATA, volume 3744 of Lecture Notes in Computer Science, page 74-83. Springer, (2005)Self-Protected Mobile Agents., , and . AAMAS, page 362-367. IEEE Computer Society, (2004)Amapola: A Simple Infrastructure for Ubiquitous Computing., , , , , and . INTELLCOMM, volume 190 of IFIP, page 77-86. Springer, (2005)Distributed Authorization Framework for Mobile Agents., , , and . MATA, volume 3744 of Lecture Notes in Computer Science, page 127-136. Springer, (2005)