Author of the publication

A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case.

, and . ARES, page 467-472. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Mechanism Against the RSU Compromise Attack in a Ticket-Based Authentication Scheme for VANETs., , , and . EMCIS, volume 381 of Lecture Notes in Business Information Processing, page 403-416. Springer, (2019)Towards a Formal Validation of a Hybrid Multi-Agent Routing Protocol for Ad hoc Networks., , and . Int. J. Bus. Data Commun. Netw., 17 (2): 1-15 (2021)A Distributed Resource Management for VANET using Smart Contract., , , and . IWCMC, page 1448-1453. IEEE, (2021)Formal Validation of a Security Mechanism against the RSU Compromise Attack., , , and . ARES, page 54:1-54:8. ACM, (2021)Trust-based delegation for Ad Hoc QoS enhancing., and . CRiSIS, page 1-7. IEEE Computer Society, (2012)A Reputation-Based Clustering Mechanism for MANET Routing Security., , and . ARES, page 310-315. IEEE Computer Society, (2013)A secure network coding-enabled approach for a confidential cluster-based routing in wireless sensor networks., , , , and . SAC, page 2151-2157. ACM, (2020)Using security policies in a network securing process., and . ICT, page 416-421. IEEE, (2011)Delegation Management Modeling in a Security Policy based Environment., and . SCSS, volume 122 of EPTCS, page 85-95. (2012)A Formal Environment for Credibility and Accuracy Assessment of Safety Messages Exchanged in VANETs., , , and . EMCIS, volume 381 of Lecture Notes in Business Information Processing, page 391-402. Springer, (2019)