Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks., , , , , and . CoRR, (2016)Graphical User Authentication in Mobile Device using the web RGB color palette., , and . BCI (Local), volume 1036 of CEUR Workshop Proceedings, page 65. CEUR-WS.org, (2013)Declarative Modelling in Computer Graphics: Current Results and Future Issues., , and . International Conference on Computational Science, volume 3039 of Lecture Notes in Computer Science, page 80-89. Springer, (2004)An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks., , , , , and . CoRR, (2016)Assessment of spatial isolation in Jailhouse: Towards a generic approach., , , and . Comput. Networks, (2024)3D Graph Visualisation of Web Normal and Malicious Traffic., , , , and . IV, page 621-629. IEEE Computer Society, (2006)A Secure and Trusted Channel Protocol for UAVs Fleets., , , , , , and . WISTP, volume 10741 of Lecture Notes in Computer Science, page 3-24. Springer, (2017)Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements., , , , and . Trustcom/BigDataSE/ISPA, page 606-614. IEEE, (2016)Parallel Generation for Hierarchical Declarative Scene Modeling., and . WSCG, (2000)MANETs: An Exclusive Choice Between Use and Security?, , and . Comput. Informatics, 27 (5): 799-821 (2008)