Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Secure TCP/IP Profile in 61850 Based Substation Automation System for Smart Grids., , , , and . Int. J. Distributed Sens. Networks, 12 (4): 5793183:1-5793183:11 (2016)A model for dimensioning a secure event-driven health care system., , , , and . WMNC, page 30-37. IEEE, (2012)A H.264 SVC distributed content protection system with flexible key stream generation., , , , and . ICCE-Berlin, page 66-70. IEEE, (2012)INRISCO: INcident monitoRing In Smart COmmunities., , , , , , , , , and 6 other author(s). CoRR, (2023)Media Gateway: bringing privacy to private multimedia cloud connections., , , , and . Telecommun. Syst., 55 (2): 315-330 (2014)Overhead of using secure wireless communications in mobile computing., , , , and . IEEE Trans. Consumer Electron., (2013)Distributed access control and privacy for the internet of me., , , , and . ICCE, page 17-18. IEEE, (2016)Proxy re-encryption schemes for IoT and crowd sensing., , , , and . ICCE, page 15-16. IEEE, (2016)Privacy enhanced cloud services home aggregator., , , , and . ICCE, page 646-647. IEEE, (2012)Towards dynamic trust establishment for identity federation., , , and . EATIS, page 25. (2009)