Author of the publication

A Protocol for Incorporating Biometrics in 3G with Respect to Privacy.

, and . WOSIS, page 123-135. INSTICC Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions., and . Int. J. Netw. Secur., 5 (1): 99-111 (2007)A Protocol for Incorporating Biometrics in 3G with Respect to Privacy., and . WOSIS, page 123-135. INSTICC Press, (2005)Improving Mobile Core Network Security with Honeynets.. IEEE Secur. Priv., 5 (4): 40-47 (2007)An identity management protocol for Internet applications over 3G mobile networks., and . Comput. Secur., 25 (1): 45-51 (2006)Αρχιτεκτονικές ασφαλείας ασύρματων ευρυζωνικών τηλεπικοινωνιακών δικτύων 4ης γενιάς. University of Piraeus, Greece, (2007)National Archive of PhD Theses: oai:10442/20715.Security for Mobile Operators in Practice.. Int. J. Netw. Secur., 15 (5): 397-404 (2013)Biometric access control for athletic events., and . I3E, volume 226 of IFIP, page 22-30. Springer, (2006)Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions., and . SPC, volume 3934 of Lecture Notes in Computer Science, page 211-226. Springer, (2006)Application of Multi-criteria Analysis for the Creation of a Risk Assessment Knowledgebase for Biometric Systems., and . ICBA, volume 3072 of Lecture Notes in Computer Science, page 724-730. Springer, (2004)Risk Analysis of Biometric Systems., and . WOSIS, page 23-32. INSTICC Press, (2004)