Author of the publication

A Lifecycle for Data Sharing Agreements: How it Works Out.

, , , , , , and . APF, volume 9857 of Lecture Notes in Computer Science, page 3-20. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Energy-Reading for Smart Meter., and . ICOST, volume 9102 of Lecture Notes in Computer Science, page 165-177. Springer, (2015)Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security., , , and . Comput. Networks, (2022)CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem., , , , , and . TrustCom, page 1211-1218. IEEE, (2022)Exploiting Vehicles' Reputation to Mitigate DoS Attack., , and . AMARETTO@MODELSWARD, page 75-82. SciTePress, (2016)CANDY CREAM - Hacking Infotainment Android Systems to Command Instrument Cluster via Can Data Frame., and . CSE/EUC, page 476-481. IEEE, (2019)Analysis of Functional Safety in a secure implementation of CAN Protocol., , and . INDIN, page 134-141. IEEE, (2020)Improving Vehicle Safety Through a Fog Collaborative Infrastructure., , , and . SMARTCOMP, page 446-451. IEEE Computer Society, (2018)An Improved Role-Based Access to Android Applications with JCHR., , , and . ARES, page 341-348. IEEE Computer Society, (2014)Demo: CANDY CREAM., and . SAFECOMP Workshops, volume 11699 of Lecture Notes in Computer Science, page 203-209. Springer, (2019)Privacy-preserving mobility-casting in opportunistic networks., , and . PST, page 10-18. IEEE Computer Society, (2014)