Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Taxonomy Model for Cloud Computing Services., , , , , , and . CLOSER, page 56-65. SciTePress, (2011)Privacy-preserving linkage/revocation of VANET certificates without LAs., , , , , and . IACR Cryptology ePrint Archive, (2018)Designing and Assessing Multi-tenant Isolation Strategies for Cloud Networks., , and . ICIN, page 214-221. IEEE, (2019)Revocation in Vehicular Public Key Infrastructures: Balancing privacy and efficiency., , , , and . Veh. Commun., (2021)DVID: Adding Delegated Authentication to SPIFFE Trusted Domains., , , , , , , and . AINA (4), volume 202 of Lecture Notes on Data Engineering and Communications Technologies, page 289-300. Springer, (2024)An architecture for P2P locality in managed networks using hierarchical trackers., , , , and . CNSM, page 206-213. IEEE, (2010)Classifying Security Threats in Cloud Networking., , , , , and . CLOSER, page 214-220. SciTePress, (2015)Mobile health in emerging countries: A survey of research initiatives in Brazil., , , , , , , , , and . Int. J. Medical Informatics, 82 (5): 283-298 (2013)Securing hard drives with the Security Protocol and Data Model (SPDM)., , and . ISVLSI, page 446-447. IEEE, (2022)Faster Isogeny-Based Compressed Key Agreement., , , , and . PQCrypto, volume 10786 of Lecture Notes in Computer Science, page 248-268. Springer, (2018)