Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting the Itinerary of Mobile Agents., , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 301. Springer, (1998)A Pessimistic Approach to Trust in Mobile Agent Platforms., , and . IEEE Internet Comput., 4 (5): 40-48 (2000)Cryptographic Protection of Connection Integrity with Interruption Detection in TINA., and . DAIS, Chapman & Hall, (1997)An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection.. AFRICACRYPT, volume 7918 of Lecture Notes in Computer Science, page 392-405. Springer, (2013)Extensions to an authentication technique proposed for the global mobility network., , , and . IEEE Trans. Commun., 48 (3): 373-376 (2000)Workshop on Electronic Commerce - Foreword., and . SRDS, page 329. IEEE Computer Society, (1999)Introducing Trusted Third Parties to the Mobile Agent Paradigm., , and . Secure Internet Programming, volume 1603 of Lecture Notes in Computer Science, page 469-489. Springer, (1999)Closed user groups in Internet service centres., , , , , and . DAIS, volume 143 of IFIP Conference Proceedings, page 439-. Kluwer, (1999)On the Problem of Trust in Mobile Agent Systems., , and . NDSS, The Internet Society, (1998)A Simple Logic for Authentication Protocol Design., , and . CSFW, page 153-162. IEEE Computer Society, (1998)