Author of the publication

Selling multimedia resources in ad hoc networks.

, and . IEEE Communications Magazine, 46 (2): 126-131 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What the heck is this application doing? - A security-by-contract architecture for pervasive services., , , and . Comput. Secur., 28 (7): 566-577 (2009)Application of ART2 Networks and Self-Organizing Maps to Collaborative Filtering., and . OHS-7/SC-3/AH-3, volume 2266 of Lecture Notes in Computer Science, page 296-309. Springer, (2001)A Signaling Perspective on Token dispersion and Venture Performance in initial Coin Offerings., , and . ECIS, (2021)Policy Evolution in Distributed Usage Control., , , and . STM@IFIPTM, volume 244 of Electronic Notes in Theoretical Computer Science, page 109-123. Elsevier, (2008)Usage Control Requirements in Mobile and Ubiquitous Computing Applications., , , and . ICSNC, page 27. IEEE Computer Society, (2006)Evidence Gathering for Remuneration of Shared Connections., , , and . CNSR, page 569-576. IEEE Computer Society, (2008)A Security-by-Contract Architecture for Pervasive Services., , , , and . SECPerU, page 49-54. IEEE Computer Society, (2007)Entwurf eines anthropomorphen Roboterarms: Kinematik, Arbeitsraumanalyse, Softwaremodellierung. Karlsruhe University, Germany, (2001)base-search.net (ftubkarlsruhe:oai:EVASTAR-Karlsruhe.de:842001).Usage Control Policy Enforcement in OpenOffice.org and Information Flow., , , and . ISSA, page 393-406. ISSA, Pretoria, South Africa, (2009)Usage Control Enforcement: Present and Future., , , , and . IEEE Secur. Priv., 6 (4): 44-53 (2008)