Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automating trusted key rollover in DNSSEC.. Journal of Computer Security, 17 (6): 839-854 (2009)A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks., and . VNC, page 1-7. IEEE, (2009)Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings., , , , and . IFIPTM, volume 454 of IFIP Advances in Information and Communication Technology, page 92-108. Springer, (2015)CVE representation to build attack positions graphs., , , , and . IEEE Big Data, page 3063-3067. IEEE, (2023)Extending Signatures of Reputation., , , , and . Privacy and Identity Management, volume 421 of IFIP Advances in Information and Communication Technology, page 165-176. Springer, (2013)Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs)., and . WISTP, volume 5019 of Lecture Notes in Computer Science, page 106-116. Springer, (2008)AMORES: an architecture for mobiquitous resilient systems., , , , , , , , , and 4 other author(s). ARMOR, page 7:1-7:6. ACM, (2012)On the Sybil attack detection in VANET., and . MASS, page 1-6. IEEE Computer Society, (2007)SEER4US, Secured Energy Efficient Routing for UAV Swarms., , , and . WiMob, page 1-6. IEEE, (2019)PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns., , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 5252-5264 (December 2022)