Author of the publication

ÆTHER: an Authorization Management Architecture for Ubiquitous Computing.

, and . EuroPKI, volume 3093 of Lecture Notes in Computer Science, page 246-259. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Communications in the Smart Home., and . EUC, volume 3207 of Lecture Notes in Computer Science, page 891-902. Springer, (2004)Analysing the Security Threats against Network Convergence Architectures., , , , and . IAS, page 241-246. IEEE Computer Society, (2007)TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments., , , and . GLOBECOM, page 1979-1984. IEEE, (2008)Performance Analysis of Cryptographic Protocols on Handheld Devices., , , and . NCA, page 169-174. IEEE Computer Society, (2004)Managing Policies for Dynamic Spectrum Access., , , , , , , and . Autonomic Networking, volume 4195 of Lecture Notes in Computer Science, page 285-297. Springer, (2006)Towards Flexible Authorization Management., and . ISCC, page 421-426. IEEE Computer Society, (2005)Ad Hoc Networks: Security., and . Encyclopedia of Wireless and Mobile Communications, (2008)Real-Time Intrusion Detection for Ad Hoc Networks., , and . WOWMOM, page 374-380. IEEE Computer Society, (2005)Collaborative service evaluation with the TwoHop trust framework., , and . Secur. Commun. Networks, 5 (6): 594-613 (2012)ÆTHER: an Authorization Management Architecture for Ubiquitous Computing., and . EuroPKI, volume 3093 of Lecture Notes in Computer Science, page 246-259. Springer, (2004)