Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing the drop-box architecture for assisted living., , , and . FMSE, page 1-12. ACM, (2006)Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems., , , and . ISPEC, volume 3903 of Lecture Notes in Computer Science, page 235-247. Springer, (2006)A Performance/Energy Analysis and Optimization of Multi-Core Architectures with Voltage Scaling Techniques., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (6): 1215-1225 (2010)AMY: Use your cell phone to create a protected personal network over devices., , , and . IEEE Trans. Consumer Electron., 57 (1): 99-104 (2011)A Policy Language for the Extended Reference Monitor in Trusted Operating Systems., , , and . ARES, page 1160-1166. IEEE Computer Society, (2007)Extended Role Based Access Control and Procedural Restrictions., , , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 184-196. Springer, (2003)A Small But Non-negligible Flaw in the Android Permission Scheme., , , , and . POLICY, page 107-110. IEEE Computer Society, (2010)How to Bootstrap Security for Ad-Hoc Network: Revisited., , , , and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 119-131. Springer, (2009)A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework., , , and . SocialCom/PASSAT, page 944-951. IEEE Computer Society, (2010)Enforcement of Integrated Security Policy in Trusted Operating Systems., , , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 214-229. Springer, (2007)