Author of the publication

MILC: A secure and privacy-preserving mobile instant locator with chatting

, , , , , and . Information Systems Frontiers, (2010)10.1007/s10796-010-9254-0.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introducing Ontology-based Security Policy Management in the Grid., and . ECIW, page 107-116. Academic Conferences Limited, Reading, UK, (2005)Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains., , , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 125-134. Springer, (2007)On Device Authentication in Wireless Networks: Present Issues and Future Challenges., and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 135-144. Springer, (2007)Cloud Forensics: Identifying the Major Issues and Challenges., , , and . CAiSE, volume 8484 of Lecture Notes in Computer Science, page 271-284. Springer, (2014)Workflow Based Security Incident Management., , and . Panhellenic Conference on Informatics, volume 3746 of Lecture Notes in Computer Science, page 684-694. Springer, (2005)Designing secure RFID authentication protocols is (still) a non-trivial task., , and . NSS, page 73-80. IEEE, (2011)KAMU: providing advanced user privacy in Kerberos multi-domain scenarios., , , , , and . Int. J. Inf. Sec., 12 (6): 505-525 (2013)A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments., , , and . Future Internet, 7 (4): 500-515 (2015)The Role of Users' Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study., , , and . Future Internet, 14 (11): 328 (2022)Cyber insurance: state of the art, trends and future directions., , , and . Int. J. Inf. Sec., 22 (3): 737-748 (June 2023)