Author of the publication

Applying Kerberos to the Communication Environment for Information Appliances.

, , , and . SAINT Workshops, page 214-217. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Architecture for Control Networks using IPsec and KINK., , , , , and . SAINT, page 414-420. IEEE Computer Society, (2005)A translation method between 802.15.4 nodes and IPv6 nodes., , , , and . SAINT Workshops, page 34-37. IEEE Computer Society, (2006)ENM: A service oriented architecture for ontology-driven network management in heterogeneous network infrastructures., , , and . NOMS, page 1096-1103. IEEE, (2012)Applying Kerberos to the Communication Environment for Information Appliances., , , and . SAINT Workshops, page 214-217. IEEE Computer Society, (2003)Considerations for multicast scalability of fieldbus protocols on IP/Ethernet., and . INDIN, page 54-59. IEEE, (2009)A Prototype of a Secure Autonomous Bootstrap Mechanism for Control Networks., , , , and . SAINT, page 56-62. IEEE Computer Society, (2006)Issues of Control Networks when Introducing IP.. SAINT Workshops, page 80-83. IEEE Computer Society, (2005)Extending a Secure Autonomous Bootstrap Mechanism to Multicast Security., , , and . SAINT Workshops, page 71. IEEE Computer Society, (2007)Field Experiment of an Extendable Traceability System: Application to the Quality Control of Beef-Product Distribution., , , , and . IPC, page 503-508. IEEE Computer Society, (2007)