Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy for Mobile and Multi-homed Nodes (MoMiPriv): Formalizing the Threat Model, , , , , , and . draft-haddad-momipriv-threat-model-00, (2005)Technical Considerations for Next-Generation 911, , and . (2011)Internet Protocol-based Emergency Services., and . Wiley, (2013)HIP based Approach for Configuration Provisioning., and . PIMRC, page 1-5. IEEE, (2006)LoST: A Protocol for Mapping Geographic Locations to Public Safety Answering Points., , , and . IPCCC, page 606-611. IEEE Computer Society, (2007)Cloud-based computation offloading for mobile devices: State of the art, challenges and opportunities., , , , , and . Future Network & Mobile Summit, page 1-11. IEEE, (2013)An Authorisation and Privacy Framework for Context-Aware Networks., , , and . MATA, volume 3744 of Lecture Notes in Computer Science, page 149-160. Springer, (2005)Performance Study of the NSIS QoS-NSLP Protocol., , , and . GLOBECOM, page 2531-2536. IEEE, (2008)Low-Power IoT Communication Security: On the Performance of DTLS and TLS 1.3., , and . PEMWN, page 1-6. IEEE, (2020)Geolocation Policy: A Document Format for Expressing Privacy Preferences for Location Information, , , , and . Internet Draft draft-ietf-geopriv-policy-17, (June 2008)