Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Key ID Information Type for the General Extension Payload in Multimedia Internet KEYing (MIKEY)., , and . RFC, (June 2006)OpenSAW: Open Security Analysis Workbench., , , , , and . FASE, volume 10202 of Lecture Notes in Computer Science, page 321-337. Springer, (2017)Conversational IP multimedia security., , , , and . MWCN, page 147-151. IEEE, (2002)The Secure Real-time Transport Protocol (SRTP)., , , , and . RFC, (March 2004)Extended Formal Analysis of the EDHOC Protocol in Tamarin., , and . ICETE (Selected Papers), volume 1795 of Communications in Computer and Information Science, page 224-248. Springer, (2021)Subscription identifier privacy in 5G systems., , , and . MoWNet, page 1-8. IEEE, (2017)A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy., , , and . TrustCom/BigDataSE/ISPA (1), page 1205-1209. IEEE, (2015)Key Management Extensions for Session Description Protocol (SDP) and Real Time Streaming Protocol (RTSP)., , , , and . RFC, (July 2006)Integrity Transform Carrying Roll-Over Counter for the Secure Real-time Transport Protocol (SRTP)., , and . RFC, (January 2007)Formal Analysis of Security Procedures in LTE - A Feasibility Study., and . RAID, volume 8688 of Lecture Notes in Computer Science, page 341-361. Springer, (2014)