Author of the publication

USN Middleware Security Model.

, , , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 354-365. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Certificate Management for Mobile Ad-Hoc Network., and . ADHOC-NOW, volume 4104 of Lecture Notes in Computer Science, page 355-364. Springer, (2006)Development of an Automatic Document Malware Analysis System., , , and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 3-11. Springer, (2012)A SIP-TRW algorithm for DDoS attack detection in SIP environments., , , , and . ICUIMC, page 75. ACM, (2010)Detecting P2P Botnets Using a Multi-phased Flow Model., , , , and . ICDS, page 247-253. IEEE Computer Society, (2009)Analysis of the OPENID from a privacy law perspective., , , and . IADIS AC (1), page 209-216. IADIS Press, (2009)Design and Implementation of SIP-aware Security Management System., , , , , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 10-19. Springer, (2009)Global Transaction Control with Multilevel Security Environments.. FSKD, volume 4223 of Lecture Notes in Computer Science, page 660-663. Springer, (2006)USN Middleware Security Model., , , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 354-365. Springer, (2009)Detection of SIP De-Registration and Call-Disruption Attacks Using a Retransmission Mechanism and a Countermeasure Scheme., , , , and . SITIS, page 650-656. IEEE Computer Society, (2008)Secure Transaction Processing in Multi-expert Systems with Replicated Data., , and . KES, volume 2774 of Lecture Notes in Computer Science, page 834-840. Springer, (2003)