Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Credential Provisioning and Device Configuration with EAP., , , , , and . MobiWac, page 87-96. ACM, (2021)Privacy of the long-term identities in cellular networks., and . MobiMedia, page 167-175. ACM, (2016)Trusted Hart for Mobile RISC-V Security., , , , , , and . TrustCom, page 1587-1596. IEEE, (2022)AKMA Support in Multi SIM User Equipment., , and . FRUCT, page 15-24. IEEE, (2019)Privacy-Aware Access Protocols for MEC Applications in 5G., , and . Network, 2 (2): 203-224 (2022)Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems., and . ESAS, volume 3313 of Lecture Notes in Computer Science, page 95-106. Springer, (2004)Privacy Preserving AKMA in 5G., , and . SSR, page 45-56. ACM, (2019)On De-synchronization of User Pseudonyms in Mobile Networks., , , and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 347-366. Springer, (2017)AKMA for Secure Multi-access Edge Computing Mobility in 5G., , and . ICCSA (Workshops 4), volume 13380 of Lecture Notes in Computer Science, page 432-449. Springer, (2022)Authentication of fragments with short tags., , and . Theor. Comput. Sci., (2024)