Author of the publication

Privacy and fair information practices in ubiquitous environments: Research challenges and future directions.

, , , and . Internet Res., 19 (2): 194-208 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Li-Fi based on security cloud framework for future IT environment., , , , and . Hum. centric Comput. Inf. Sci., (2018)Advances in security and multimodality for pervasive computing environments - TS Special Issue., , , and . Telecommun. Syst., 52 (2): 1341-1342 (2013)Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities., , and . IEEE Trans. Ind. Informatics, 14 (8): 3567-3569 (2018)A blockchain-based decentralized efficient investigation framework for IoT digital forensics., , , and . J. Supercomput., 75 (8): 4372-4387 (2019)Telling Computer and Human Apart: Image-Sound Based CAPTCHA System., , , and . MUE/FutureTech, volume 448 of Lecture Notes in Electrical Engineering, page 733-736. (2017)Efficient sensor node authentication in third generation-wireless sensor networks integrated networks., , , and . IET Commun., 5 (12): 1744-1754 (2011)Privacy and fair information practices in ubiquitous environments: Research challenges and future directions., , , and . Internet Res., 19 (2): 194-208 (2009)A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication., , , , and . Int. J. Commun. Syst., 24 (4): 461-472 (2011)Hybrid security protocol for wireless body area networks., , , and . Wirel. Commun. Mob. Comput., 11 (2): 277-288 (2011)IEEE 802.11 handoff latency improvement using Fuzzy Logic., , , and . Wirel. Commun. Mob. Comput., 8 (9): 1201-1213 (2008)