Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Accounting Enhancements for Roaming in IMS.. WWIC, volume 5031 of Lecture Notes in Computer Science, page 127-138. Springer, (2008)Applicability of Host Identities in Securing Network Attachment and Ensuring Service Accountability.. University of Tampere, Finland, (2011)base-search.net (ftunivtampere:oai:trepo.tuni.fi:10024/114308).Continuous On-Line Validation of Web Services., , , and . ELPUB, Verlag für Wissenschaft und Forschung, (2002)Accountable security mechanism based on security service level agreement., , , , , , and . ISCC, page 404-410. IEEE Computer Society, (2013)Tailored Security: Building Non-Repudiable Security Service Level Agreements, , , , , , and . IEEE Vehicular Technology Magazine, (2013)Identity-bound accounting., and . CNSM, page 382-385. IEEE, (2010)Security and User Guidelines for the Design of the Future Networked Systems., , and . ICDS, page 13-19. IEEE Computer Society, (2009)Privacy-enhanced personalisation in ambient environments., , , , and . PIMRC, page 1-6. IEEE, (2008)An Architecture to Facilitate Membership and Service Management in Trusted Communities., and . CASoN, page 113-118. IEEE Computer Society, (2009)Attaching an IMS Subscriber to an Unknown Foreign Network.. AICT, page 162-167. IEEE Computer Society, (2008)