Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats., , , and . IEEE Access, (2020)Towards Privacy-First Security Enablers for 6G Networks: The PRIVATEER Approach., , , , , , , , , and 15 other author(s). SAMOS, volume 14385 of Lecture Notes in Computer Science, page 379-391. Springer, (2023)How many FIDO protocols are needed? Surveying the design, security and market perspectives., , and . CoRR, (2021)Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security., , and . VNC, page 199-206. IEEE, (2023)Trusted and Secure Self-Sovereign Identity framework., , , and . ARES, page 101:1-101:6. ACM, (2022)A Digital Twin for the 5G Era: the SPIDER Cyber Range., , , , , , , , , and 2 other author(s). WoWMoM, page 567-572. IEEE, (2022)Towards building a Self-Sovereign Identity Framework for Healthcare., , , , , , , , and . EMBC, page 1-4. IEEE, (2023)Unveiling the user requirements of a cyber range for 5G security testing and training., , , , and . CAMAD, page 1-6. IEEE, (2021)A forensic investigation of Android mobile applications., , , and . PCI, page 58-63. ACM, (2018)