Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protection of Components Based on a Smart-Card Enhanced Security Module., , , , and . CRITIS, volume 4347 of Lecture Notes in Computer Science, page 128-139. Springer, (2006)VD-IT2, Virtual Disk Cloning on Disk Arrays Using a Type-2 Fuzzy Controller., , and . IEEE Trans. Fuzzy Syst., 25 (6): 1752-1764 (2017)FuSnap: Fuzzy Control of Logical Volume Snapshot Replication for Disk Arrays., and . IEEE Trans. Ind. Electron., 58 (9): 4436-4444 (2011)Protecting On-Line Casinos against Fraudulent Player Drop-Out., , , , , , and . ITCC (1), page 500-505. IEEE Computer Society, (2005)FIPA-Based Interoperable Agent Mobility., , , , and . CEEMAS, volume 4696 of Lecture Notes in Computer Science, page 319-321. Springer, (2007)Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation., , , , , and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 223-235. Springer, (2004)Role-Based Access Control for E-commerce Sea-of-Data Applications., , and . ISC, volume 2433 of Lecture Notes in Computer Science, page 102-116. Springer, (2002)Enabling Mobile Agents Interoperability Through FIPA Standards., , , , and . CIA, volume 4149 of Lecture Notes in Computer Science, page 388-401. Springer, (2006)FIPA-based Interoperable Agent Mobility Proposal, , , , and . CoRR, (2007)Access control with safe role assignment for mobile agents., , , and . AAMAS, page 1235-1236. ACM, (2005)