Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Expressive Dialogues and Gradient Information to Improve Trade-Offs in Bilateral Negotiations., , , and . EC-Web, volume 5183 of Lecture Notes in Computer Science, page 71-80. Springer, (2008)Forensic analysis of Telegram Messenger for Windows Phone., , and . Digital Investigation, (2017)Secure Communications and Protected Data for a Internet of Things Smart Toy Platform., , , , , and . IEEE Internet Things J., 6 (2): 3785-3795 (2019)Providing Authentication & Authorization Mechanisms for Active Service Charging., , , and . QofIS, volume 2511 of Lecture Notes in Computer Science, page 337-346. Springer, (2002)ROSA: Realistic Open Security Architecture for Active Networks., , , and . IWAN, volume 2546 of Lecture Notes in Computer Science, page 204-215. Springer, (2002)Automated Purchase Negotiations in a Dynac Electronic Marketplace., , and . ICUC, volume 208 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)An Infocard-Based Proposal for Unified Single Sign on., , , , and . SAINT, page 231-234. IEEE Computer Society, (2009)A Novel Method for Automatic Detection and Classification of Movement Patterns in Short Duration Playing Activities., , , , , and . IEEE Access, (2018)DoS Protection for a Pragmatic Multiservice Network Based on Programmable Networks., , , and . Autonomic Networking, volume 4195 of Lecture Notes in Computer Science, page 76-85. Springer, (2006)Forensic analysis of Nucleus RTOS on MTK smartwatches., , and . Digital Investigation, (2019)