Author of the publication

Management of Groups and Group Keys in Multi-level Security Environments.

, and . SAFECOMP, volume 4680 of Lecture Notes in Computer Science, page 75-80. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Balancing Security and Energy Consumption in Wireless Sensor Networks., , and . MSN, volume 4864 of Lecture Notes in Computer Science, page 469-480. Springer, (2007)Security mechanisms for computer networks.. Ellis Horwood series in computers and their applications Ellis Horwood, (1989)Transaction protection by äntennas".. Comput. Secur., 9 (3): 245-255 (1990)Security Mechanisms for Computer Networks.. Comput. Networks, (1988)A Secure Payment System for Electronic Commerce., , , and . DEXA Workshop, page 832-836. IEEE Computer Society, (1999)Editorial.. Comput. Commun., 17 (7): 451-452 (1994)MagicNET: mobile agents data protection system., , , and . Trans. Emerg. Telecommun. Technol., 26 (5): 813-835 (2015)Intrusion Detection and Prevention System using Secure Mobile Agents., and . SECRYPT, page 107-113. INSTICC Press, (2008)Extended OSI Security Architecture.. Comput. Networks, (1989)Providing an Additional Factor for Patient Identification Based on Digital Fingerprint., , and . HealthSec, USENIX Association, (2011)