Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer-to-Peer Security in Mobile Devices: A User Perspective.. Peer-to-Peer Computing, page 252-257. IEEE Computer Society, (2004)Wireless Java RMI., , , and . EDOC, page 114-123. IEEE Computer Society, (2000)Security and reliability challenges in component-based software for consumer devices., , and . IASTED Conf. on Software Engineering, page 692-700. IASTED/ACTA Press, (2004)Providing Messaging Interoperability in FIPA Communication Architecture., and . DAIS, volume 198 of IFIP Conference Proceedings, page 121-126. Kluwer, (2001)Mobile, on demand access of service-annotated 3D maps., , and . IASTED Conf. on Software Engineering, page 719-725. IASTED/ACTA Press, (2004)Enabling Technologies for Mobile Services: The MobiLife Book, , , , , , , , , and 6 other author(s). chapter 6. Privacy, Trust and Group Communications, John Wiley & Sons, (October 2007)Context-aware Group Management in Mobile Environments, , , , , , , , , and 2 other author(s). Proceedings of the 14th IST Mobile & Wireless Communications Summit, page 1-6. Dresden, Germany, (June 2005)Dynamic Composition of Execution Environment for Adaptive Nomadic Applications.. MATA, volume 2164 of Lecture Notes in Computer Science, page 73-80. Springer, (2001)Context-aware Group Management in Mobile Environments, , , , , , , , , and 2 other author(s). IST Summit 2005, Dresden, (2005)The Green Card Protocol: An Identification Protocol for Decentralized Systems.. WOWMOM, page 647-651. IEEE Computer Society, (2006)