Author of the publication

Security Clustering: A Network-Wide Secure Computing Mechanism in Pervasive Computing.

, , , , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 1326-1331. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certificate validation service using XKMS for computational grid., , and . XML Security, page 112-120. ACM, (2003)Security Frameworks for Open LBS Based on Web Services Security Mechanism., , , , and . ISPA Workshops, volume 3759 of Lecture Notes in Computer Science, page 609-618. Springer, (2005)Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment., , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 784-791. Springer, (2004)Middleware Framework for Secure Grid Application in Mobile Web Services Environment., , , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 406-413. Springer, (2004)A XKMS-Based Security Framework for Mobile Grid into the XML Web Services., , , and . International Conference on Computational Science, volume 3038 of Lecture Notes in Computer Science, page 124-132. Springer, (2004)Certificate Validation Scheme of Open Grid Service Usage XKMS., , , and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 849-858. Springer, (2003)An Automatic Security Evaluation System for IPv6 Network., , , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 150-161. Springer, (2003)XML key management system for Web-based business application., , and . NOMS (1), page 903-904. IEEE, (2004)Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services., , , , and . J. Inf. Process. Syst., 1 (1): 86-95 (2005)An enhanced LBS security protocol in wireless networks., , , and . IGARSS, page 1594-1597. IEEE, (2005)