Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OPA: Onion Policy Administration Model - Another approach to manage rights in DRM., , and . SEC, volume 232 of IFIP, page 349-360. Springer, (2007)Building a Fair System Using Access Rights., , and . ICISS, volume 10063 of Lecture Notes in Computer Science, page 89-108. Springer, (2016)Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks., , , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 524-529. Springer, (2014)Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks., , , and . ARES, page 157-166. IEEE Computer Society, (2016)Privacy Administration in Distributed Service Infrastructure., , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 53-70. Springer, (2010)Resource Classification Based Negotiation in Web Services., , , and . IAS, page 313-318. IEEE Computer Society, (2007)A formal approach for testing security rules., , , , and . SACMAT, page 127-132. ACM, (2007)Attacker Attribution via Characteristics Inference Using Honeypot Data., , , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 155-169. Springer, (2022)A Certificate-Less Key Exchange Protocol for IoT., , , and . CRiSIS, volume 11391 of Lecture Notes in Computer Science, page 65-79. Springer, (2018)A Posteriori Analysis of Policy Temporal Compliance., , , and . CRiSIS, volume 12528 of Lecture Notes in Computer Science, page 133-148. Springer, (2020)