Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formalizing Trust Requirements and Specification in Service Workflow Environments., and . ICEIS (3), page 196-206. SciTePress, (2011)Analysis of Trusted Execution Environment usage in Samsung KNOX., , , , and . SysTEX@Middleware, page 7:1-7:6. ACM, (2016)Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices., , , and . CoRR, (2016)RepCloud: Attesting to Cloud Service Dependency., and . IEEE Trans. Serv. Comput., 10 (5): 675-688 (2017)Innovations for Grid Security from Trusted Computing., , , and . Security Protocols Workshop, volume 5087 of Lecture Notes in Computer Science, page 132-149. Springer, (2006)KEDS: Decentralised Network Security for the Smart Home Environment., and . SmartGridSec, volume 8448 of Lecture Notes in Computer Science, page 63-78. Springer, (2014)Towards an open, trusted digital rights management platform., and . Digital Rights Management Workshop, page 79-88. ACM, (2006)A verification system for interval-based specification languages., , , and . ACM Trans. Softw. Eng. Methodol., 19 (4): 13:1-13:36 (2010)W Reconstructed., and . ZUM, volume 1212 of Lecture Notes in Computer Science, page 115-134. Springer, (1997)Formal Trust Specification in Service Workflows., and . EUC, page 703-710. IEEE Computer Society, (2010)