Author of the publication

Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications.

, , and . CAiSE Workshops, volume 75 of CEUR Workshop Proceedings, CEUR-WS.org, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guaranteeing the Authenticity of Location Information., , and . IEEE Pervasive Computing, 7 (3): 72-80 (2008)CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies., , and . ARES, page 363-368. IEEE Computer Society, (2008)POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations., , , , and . MobiQuitous, volume 104 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 224-227. Springer, (2011)L-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols., , , and . DPM/SETOP, volume 6514 of Lecture Notes in Computer Science, page 108-122. Springer, (2010)Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills., , , and . J. Educ. Technol. Soc., 16 (3): 28-43 (2013)Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal Certificates., , and . EuroPKI, volume 4582 of Lecture Notes in Computer Science, page 321-329. Springer, (2007)A Legal Ontology to Support Privacy Preservation in Location-Based Services., , , and . OTM Workshops (2), volume 4278 of Lecture Notes in Computer Science, page 1755-1764. Springer, (2006)EVAWEB V2: Enhancing a Web-Based Assessment Systems Focused on Nonrepudiation Use and Teaching., , and . IJWLTT, 3 (1): 21-32 (2008)Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol., , , and . TrustBus, volume 6264 of Lecture Notes in Computer Science, page 141-152. Springer, (2010)A Secure Perspective of Data. Including Authentication in the NewsML DTD., , , and . ICWI, page 791-794. IADIS, (2002)