Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder., , and . Communications and Multimedia Security, volume 175 of IFIP, page 209-221. Springer, (2004)Towards Secure Downloadable Executable Content: The Java Paradigm., , and . SAFECOMP, volume 1516 of Lecture Notes in Computer Science, page 117-127. Springer, (1998)Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems., , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 13-24. Springer, (2004)Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks., , and . EGOV, volume 3183 of Lecture Notes in Computer Science, page 66-71. Springer, (2004)Towards a Privacy Audit Programmes Comparison Framework., , and . EGOV, volume 3183 of Lecture Notes in Computer Science, page 328-331. Springer, (2004)A generic accounting scheme for next generation networks., , and . Comput. Networks, 53 (14): 2408-2426 (2009)Interpretability Constraints for Fuzzy Modeling Implemented by Constrained Particle Swarm Optimization., , , and . IEEE Trans. Fuzzy Syst., 26 (4): 2348-2361 (2018)Challenges and opportunities in next-generation cyberspace security., , , and . Secur. Commun. Networks, 9 (6): 455-456 (2016)Enabling the provision of secure web based m-health services utilizing XML based security models., , , , , and . Secur. Commun. Networks, 1 (5): 375-388 (2008)Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification., , and . Comput. Commun., 22 (8): 697-709 (1999)