Author of the publication

Context-Aware Security Policy for the Service Discovery.

, , and . AINA Workshops (1), page 477-482. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predictive Model for Exploit Kit based Attacks., , and . SECRYPT, page 477-482. SciTePress, (2016)Enabling Secure Discovery in a Pervasive Environment., , and . SPC, volume 3934 of Lecture Notes in Computer Science, page 18-31. Springer, (2006)Data Usage Control in the Future Internet Cloud., and . Future Internet Assembly, volume 6656 of Lecture Notes in Computer Science, page 223-235. Springer, (2011)Who Is Reusing Stolen Passwords? An Empirical Study on Stolen Passwords and Countermeasures., , , and . CSS, volume 11161 of Lecture Notes in Computer Science, page 3-17. Springer, (2018)BlindSpot: Watermarking Through Fairness., , , and . IH&MMSec, page 39-50. ACM, (2022)Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks., and . SECRYPT, page 500-505. SciTePress, (2013)Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing., , and . ECOWS, page 35-43. IEEE Computer Society, (2006)PPL: PrimeLife Privacy Policy Engine., , and . POLICY, page 184-185. IEEE Computer Society, (2011)Context-Aware Security Policy for the Service Discovery., , and . AINA Workshops (1), page 477-482. IEEE Computer Society, (2007)On the Impact of DoS Attacks on Secure Service Discovery., , and . EUC (2), page 532-537. IEEE Computer Society, (2008)978-0-7695-3492-3.