Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A General IMS Registration Protocol for Wireless Networks Interworking., , , , and . WMNC/PWC, volume 308 of IFIP Advances in Information and Communication Technology, page 32-43. Springer, (2009)Enabling SAML for Dynamic Identity Federation Management., , , and . WMNC/PWC, volume 308 of IFIP Advances in Information and Communication Technology, page 173-184. Springer, (2009)Interoperability of IP Multimedia Subsystems: The NetLab Approach., , , , , , , , , and 5 other author(s). WMNC/PWC, volume 308 of IFIP Advances in Information and Communication Technology, page 20-31. Springer, (2009)Distributed access control and privacy for the internet of me., , , , and . ICCE, page 17-18. IEEE, (2016)Proxy re-encryption schemes for IoT and crowd sensing., , , , and . ICCE, page 15-16. IEEE, (2016)Kriper: A blockchain network with permissioned storage., , , and . Future Gener. Comput. Syst., (2023)TrustAC: Trust-Based Access Control for Pervasive Devices., , , and . SPC, volume 3450 of Lecture Notes in Computer Science, page 225-238. Springer, (2005)Middleware for Secure Home Access and Control., , , , , and . PerCom Workshops, page 489-494. IEEE Computer Society, (2007)Speeding-Up DPI Traffic Classification with Chaining., , , , , , and . GLOBECOM, page 1-6. IEEE, (2018)Assessment of Fitness Tracker Security: A Case of Study., , , , and . UCAmI, volume 2 of MDPI Proceedings, page 1235. MDPI, (2018)