Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Exploiting Security Expertise in Application Development., , , , , and . TrustBus, volume 4083 of Lecture Notes in Computer Science, page 62-70. Springer, (2006)Interpretability Constraints for Fuzzy Modeling Implemented by Constrained Particle Swarm Optimization., , , and . IEEE Trans. Fuzzy Syst., 26 (4): 2348-2361 (2018)Architectures for secure portable executable content., , and . Internet Res., 9 (1): 16-24 (1999)Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks., , and . IEEE Commun. Surv. Tutorials, 9 (1-4): 18-28 (2007)Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification., , and . Comput. Commun., 22 (8): 697-709 (1999)Towards a framework for evaluating certificate status information mechanisms., , , , , and . Comput. Commun., 26 (16): 1839-1850 (2003)A framework for designing cloud forensic-enabled services (CFeS)., , , and . Requir. Eng., 24 (3): 403-430 (2019)Addressing privacy requirements in system design: the PriS method., , and . Requir. Eng., 13 (3): 241-255 (2008)A generic accounting scheme for next generation networks., , and . Comput. Networks, 53 (14): 2408-2426 (2009)On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem., and . Int. J. Inf. Sec., 12 (2): 151-154 (2013)