Author of the publication

On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management.

, , , , , and . ISAS, volume 3694 of Lecture Notes in Computer Science, page 149-163. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Long-lived authentication protocols for process control systems., , and . Int. J. Crit. Infrastructure Prot., 3 (3-4): 174-181 (2010)Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication., , and . IEEE Trans. Smart Grid, 7 (2): 807-816 (2016)Anshin as Emotional Trust: A Comparison Study between U.S. and Japanese Non-computer-science Students., , , , and . SAINT, page 161-164. IEEE Computer Society, (2009)Smart Generation and Transmission With Coherent, Real-Time Data., , , , and . Proc. IEEE, 99 (6): 928-951 (2011)On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management., , , , , and . ISAS, volume 3694 of Lecture Notes in Computer Science, page 149-163. Springer, (2005)Survivable low-cost low-delay multicast trees., and . GLOBECOM, page 6. IEEE, (2005)Evaluating Multicast Message Authentication Protocols for Use in Wide Area Power Grid Data Delivery Services., , and . HICSS, page 2151-2158. IEEE Computer Society, (2012)Quantifying Uncertainties of Security and QoS for Design of Power Grid Communications Systems., , and . HICSS, page 2566-2575. IEEE Computer Society, (2016)Security, trust, and QoS in next-generation control and communication for large power systems., , , , , , and . Int. J. Crit. Infrastructures, 4 (1/2): 3-16 (2008)Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities., , , and . SECRYPT, page 546-553. INSTICC Press, (2008)