Author of the publication

Cross-Layer Security Management Framework for Mobile Tactical Networks.

, , , and . MILCOM, page 220-225. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cooperative Visualization of Privacy Risks., , and . CDVE, volume 5220 of Lecture Notes in Computer Science, page 45-53. Springer, (2008)Protection of Virtual Property in Online Gaming., , , and . DMS, page 119-124. Knowledge Systems Institute, (2005)Privacy management system using social networking., , and . SMC, page 3327-3332. IEEE, (2007)AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks., , and . SASN, page 33-42. ACM, (2005)Automated Social Network Analysis for Collaborative Work., , , and . CDVE, volume 4101 of Lecture Notes in Computer Science, page 1-8. Springer, (2006)Analysis of privacy and non-repudiation on pay-TV systems., and . IEEE Trans. Consumer Electronics, 47 (4): 729-733 (2001)A Scalable Group Key Management Protocol., , and . IEEE Communications Letters, 12 (7): 541-543 (2008)Ensuring Privacy for Buyer-Seller E-Commerce., , and . SEC, volume 201 of IFIP, page 13-24. Springer, (2006)Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan., , , and . PST, page 131-136. (2004)Agent-based Transactions for Home Energy Services., , and . DMS, page 367-372. Knowledge Systems Institute, (2005)