Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Technologies for Mobile Services: The MobiLife Book, , , , , , , , , and 6 other author(s). chapter 6. Privacy, Trust and Group Communications, John Wiley & Sons, (October 2007)Roaming Interface Signaling Security for LTE Networks., , and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 204-217. Springer, (2018)Providing for privacy in a network infrastructure protection context., and . ICIN, page 79-86. IEEE, (2017)Securing 5G Communication in Joint Operations Between NATO Partners., and . CyCon, page 29-46. IEEE, (2024)Private Mail Retrieval Search on Encrypted Data., and . Wireless Information Systems, page 34-45. ICEIS Press, (2002)A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks., , , , and . ICFEM, volume 10009 of Lecture Notes in Computer Science, page 141-158. (2016)SMS and one-time-password interception in LTE networks., and . ICC, page 1-6. IEEE, (2017)A Testbed for Trusted Telecommunications Systems in a Safety Critical Environment., , , , , , and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 87-98. Springer, (2018)Aligning the Conflicting Needs of Privacy, Malware Detection and Network Protection., and . TrustCom/BigDataSE/ISPA (1), page 547-554. IEEE, (2015)New Attack Vectors for Mobile Core Networks. 18 (2): 943-951 (2019)