Author of the publication

A Cloud You Can Wear: Towards a Mobile and Wearable Personal Cloud.

, and . COMPSAC, page 823-828. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Please Permit Me: Stateless Delegated Authorization in Mashups, , , , and . Proceedings of the 2008 Annual Computer Security Applications Conference, Anaheim, California, IEEE Computer Society Press, (December 2008)Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems, and . CoRR, (2013)Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities., , and . LREC, page 1355-1358. European Language Resources Association (ELRA), (2014)Secure Provenance: Protecting theGenealogy of Bits., , and . login Usenix Mag., (2009)An Interaction Provenance-based Trust Management Scheme For Connected Vehicles., and . CCNC, page 731-732. IEEE, (2022)A conceptual framework for an IoT-based health assistant and its authorization model., , , and . CCWC, page 616-621. IEEE, (2018)MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2., , and . IEEE CLOUD, page 487-493. IEEE Computer Society, (2012)Towards a Threat Model and Privacy Analysis for V2P in 5G Networks., and . 5GWF, page 383-387. IEEE, (2021)A component-based framework for radio-astronomical imaging software systems., , and . Softw. Pract. Exp., 38 (5): 493-507 (2008)Exposing Adaptive Cruise Control in Advanced Driving Assistance Systems., and . WF-IoT, page 1-6. IEEE, (2022)