Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sharing conditional access modules through the home network for pay TV access., , , and . IEEE Trans. Consumer Electron., 55 (1): 88-96 (2009)A model for dimensioning a secure event-driven health care system., , , , and . WMNC, page 30-37. IEEE, (2012)Access Control Agnostic Trust Negotiation Decision Engine., , and . PIMRC, page 1-5. IEEE, (2007)Enhancing access control for mobile devices with an agnostic trust negotiation decision engine., , and . PWC, volume 245 of IFIP, page 304-315. Springer, (2007)Media Gateway: bringing privacy to private multimedia cloud connections., , , , and . Telecommun. Syst., 55 (2): 315-330 (2014)PECEVA: An adaptable and energy-saving credential validation solution for pervasive networks., , , , and . Inf. Sci., (2016)Kriper: A blockchain network with permissioned storage., , , and . Future Gener. Comput. Syst., (2023)RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security., , , , and . IEEE Trans. Inf. Forensics Secur., 13 (8): 1975-1988 (2018)Towards a seamless human interaction in IoT., , , , and . ISCE, page 1-2. IEEE, (2015)A Framework for Efficient and Scalable Service Offloading in the Mist., , , and . WF-IoT, page 460-463. IEEE, (2019)