Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Panel Description: Joint COMPSAC/SAINT Panel: Future of the Internet., , and . COMPSAC, page 21. IEEE Computer Society, (2010)An Approach to Classify Semi-structured Objects., , , and . ECOOP, volume 1628 of Lecture Notes in Computer Science, page 416-440. Springer, (1999)An adaptive concurrency control protocol for mobile transactions., , and . Mobile Networks and Computing, volume 52 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 31-49. DIMACS/AMS, (1999)Data security in location-aware applications: an approach based on RBAC., , and . Int. J. Inf. Comput. Secur., 1 (1/2): 5-38 (2007)Analysis of Encryption Key Generation in Modern Crypto Ransomware., and . IEEE Trans. Dependable Secur. Comput., 19 (2): 1239-1253 (2022)Privacy preserving multi-factor authentication with biometrics., , , , , and . J. Comput. Secur., 15 (5): 529-560 (2007)Special issue ESORICS 2021., , and . J. Comput. Secur., 30 (6): 753-755 (2022)Internet of Things (IoT): Smart and Secure Service Delivery., , , and . ACM Trans. Internet Techn., 16 (4): 22:1-22:7 (2016)Network Temperature: A Novel Statistical Index for Networks Measurement and Management., , and . ACM Trans. Internet Techn., 22 (3): 66:1-66:20 (2022)VeryIDX - A Digital Identity Management System for Pervasive Computing Environments., , , , , and . SEUS, volume 5287 of Lecture Notes in Computer Science, page 268-279. Springer, (2008)