Author of the publication

Secure Layered Architecture for Session Initiation Protocol Based on SIPSSO: Formally Proved by Scyther.

, and . ITNG, page 185-190. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain and edge computing-based architecture for participatory smart city applications., , and . Concurr. Comput. Pract. Exp., (2020)CryptoNET: Secure federation protocol and authorization policies for SMI., , and . CRiSIS, page 19-25. IEEE, (2009)Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol., , , and . KES, volume 22 of Procedia Computer Science, page 680-688. Elsevier, (2013)Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA., , , and . SECRYPT, page 387-392. SciTePress, (2014)CryptoNET : Generic Security Framework for Cloud Computing Environments.. Royal Institute of Technology, Stockholm, Sweden, (2011)base-search.net (ftkthstockholm:oai:DiVA.org:kth-32786).Secure Layered Architecture for Session Initiation Protocol Based on SIPSSO: Formally Proved by Scyther., and . ITNG, page 185-190. IEEE Computer Society, (2015)A solution to Perceptual Aliasing through Probabilistic Fuzzy Logic and SIFT., , , , , and . AIM, page 1393-1398. IEEE, (2013)VeidBlock: Verifiable Identity using Blockchain and Ledger in a Software Defined Network., and . UCC (Companion"), page 173-179. ACM, (2017)A model and design of a security provider for Java applications., , and . ICITST, page 1-7. IEEE, (2009)Assessment Criteria for Trust Models in Cloud Computing., , , , and . GreenCom/iThings/CPScom, page 254-261. IEEE, (2013)