Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder., , and . Communications and Multimedia Security, volume 175 of IFIP, page 209-221. Springer, (2004)Towards Secure Downloadable Executable Content: The Java Paradigm., , and . SAFECOMP, volume 1516 of Lecture Notes in Computer Science, page 117-127. Springer, (1998)Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems., , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 13-24. Springer, (2004)Towards a Privacy Audit Programmes Comparison Framework., , and . EGOV, volume 3183 of Lecture Notes in Computer Science, page 328-331. Springer, (2004)Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks., , and . EGOV, volume 3183 of Lecture Notes in Computer Science, page 66-71. Springer, (2004)PriS Methodology: Incorporating Privacy Requirements into the System Design Process, , and . 5th IEEE International Symposium on Signal Processing and Information Technology, page 18--21. (2005)A Framework for Exploiting Security Expertise in Application Development., , , , , and . TrustBus, volume 4083 of Lecture Notes in Computer Science, page 62-70. Springer, (2006)A framework for identity privacy in SIP., , , and . J. Netw. Comput. Appl., 33 (1): 16-28 (2010)A soft computing approach for privacy requirements engineering: The PriS framework., , and . Appl. Soft Comput., 11 (7): 4341-4348 (2011)On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem., and . Int. J. Inf. Sec., 12 (2): 151-154 (2013)