Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Secure TCP/IP Profile in 61850 Based Substation Automation System for Smart Grids., , , , and . Int. J. Distributed Sens. Networks, 12 (4): 5793183:1-5793183:11 (2016)A model for dimensioning a secure event-driven health care system., , , , and . WMNC, page 30-37. IEEE, (2012)A H.264 SVC distributed content protection system with flexible key stream generation., , , , and . ICCE-Berlin, page 66-70. IEEE, (2012)Media Gateway: bringing privacy to private multimedia cloud connections., , , , and . Telecommun. Syst., 55 (2): 315-330 (2014)Overhead of using secure wireless communications in mobile computing., , , , and . IEEE Trans. Consumer Electron., (2013)INRISCO: INcident monitoRing In Smart COmmunities., , , , , , , , , and 6 other author(s). CoRR, (2023)Distributed access control and privacy for the internet of me., , , , and . ICCE, page 17-18. IEEE, (2016)Proxy re-encryption schemes for IoT and crowd sensing., , , , and . ICCE, page 15-16. IEEE, (2016)Privacy enhanced cloud services home aggregator., , , , and . ICCE, page 646-647. IEEE, (2012)Enhancing privacy and dynamic federation in IdM for consumer cloud computing., , , , and . IEEE Trans. Consumer Electron., 58 (1): 95-103 (2012)