Author of the publication

Towards a Unified Trust Model in Pervasive Systems.

, , and . AINA Workshops, page 831-835. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finest authorizing member of common criteria certification., , , , , , and . CyberSec, page 155-160. IEEE, (2012)Trusted Cloud Computing Framework for Healthcare Sector., , , and . J. Comput. Sci., 10 (2): 240-250 (2014)Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation., , and . KSII Trans. Internet Inf. Syst., 6 (9): 2405-2423 (2012)Scalable Rekeying Algorithm in IEEE 802.16e., , , , , and . APCC, page 726-730. IEEE, (2011)A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS)., , and . ICITST, page 1-7. IEEE, (2010)A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation., , , , and . CoRR, (2016)Group based access control scheme: proof of method for secure access control architecture in mobile ad-hoc networks., , , , and . MoMM, page 446-451. ACM, (2009)An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System., , and . FDSE, volume 8860 of Lecture Notes in Computer Science, page 122-135. Springer, (2014)Forming Virtualized Secure Framework for Location Based Services (LBS) using Direct Anonymous Attestation (DAA) protocol., , , and . WiMob, page 622-629. IEEE Computer Society, (2010)A Unified Trust Model for Pervasive Environments - Simulation and Analysis., , and . KSII Trans. Internet Inf. Syst., 7 (7): 1569-1584 (2013)