Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time Intrusion Detection for Ad Hoc Networks., , and . WOWMOM, page 374-380. IEEE Computer Society, (2005)Managing Policies for Dynamic Spectrum Access., , , , , , , and . Autonomic Networking, volume 4195 of Lecture Notes in Computer Science, page 285-297. Springer, (2006)Towards Flexible Authorization Management., and . ISCC, page 421-426. IEEE Computer Society, (2005)Securing Communications in the Smart Home., and . EUC, volume 3207 of Lecture Notes in Computer Science, page 891-902. Springer, (2004)Analysing the Security Threats against Network Convergence Architectures., , , , and . IAS, page 241-246. IEEE Computer Society, (2007)Authorization management for pervasive computing. Trinity College Dublin, Ireland, (2006)Performance Analysis of Cryptographic Protocols on Handheld Devices., , , and . NCA, page 169-174. IEEE Computer Society, (2004)TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments., , , and . GLOBECOM, page 1979-1984. IEEE, (2008)A Policy-Driven Trading Framework for Market-Based Spectrum Assignment., , , and . POLICY, page 246-250. IEEE Computer Society, (2007)ÆTHER: an Authorization Management Architecture for Ubiquitous Computing., and . EuroPKI, volume 3093 of Lecture Notes in Computer Science, page 246-259. Springer, (2004)