Author of the publication

Ensuring Low Cost Authentication with Privacy Preservation in Federated IMS Environments.

, , , , , and . NTMS, page 1-5. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy Enforcement Point Model., , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 278-286. Springer, (2014)Alert correlation towards an efficient response decision support. (Corrélation d'alertes : un outil plus efficace d'aide à la décision pour répondre aux intrusions).. Telecom & Management SudParis, Évry, Essonne, France, (2015)Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation., , and . MMM-ACNS, volume 7531 of Lecture Notes in Computer Science, page 203-217. Springer, (2012)Ensuring Low Cost Authentication with Privacy Preservation in Federated IMS Environments., , , , , and . NTMS, page 1-5. IEEE, (2011)Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net., and . SSCC, volume 377 of Communications in Computer and Information Science, page 313-321. Springer, (2013)