Author of the publication

Improving Packet Filters Management through Automatic and Dynamic Schemes.

, and . SEC, volume 175 of IFIP Conference Proceedings, page 331-340. Kluwer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Flows Analysis of the ATM Emulated LAN Architecture.. Communications and Multimedia Security, volume 70 of IFIP Conference Proceedings, page 37-52. Chapman & Hall, (1996)Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption., , and . IEEE Trans. Cloud Comput., 11 (1): 25-43 (January 2023)An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contracts., , and . CoRR, (2022)Comparative Analysis of Technical and Legal Frameworks of Various National Digial Identity Solutions., , , and . CoRR, (2023)Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the IoT., , , and . ACM Comput. Surv., 54 (7): 138:1-138:34 (2022)A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications., , , and . J. Netw. Comput. Appl., (2014)Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU., , and . Comput. Secur., 29 (4): 419-431 (2010)An EAP-EHash authentication method adapted to resource constrained terminals., , , and . Ann. des Télécommunications, 65 (5-6): 271-284 (2010)Improving packet filters management through automatic and dynamic schemes., and . Ann. des Télécommunications, 56 (9-10): 595-608 (2001)Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain., , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 53-68. Springer, (2018)