Author of the publication

Managing Privacy in the Internet of Things: DocCloud, a Use Case.

, , , and . Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Class of Codes for Fingerprinting Schemes., , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 398-409. Springer, (2005)A generalization of traceability codes using ideal-based codes., and . ITW, page 66-69. IEEE, (2003)Multicast Copyright Protection System Based on a Trusted Soft-Engine., , , and . Int. J. Bus. Data Commun. Netw., 2 (2): 55-67 (2006)Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts., , , , and . DEXA, volume 2736 of Lecture Notes in Computer Science, page 927-936. Springer, (2003)Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks., , , , , and . GLOBECOM Workshops, page 1663-1668. IEEE, (2012)Implementation of an Efficient Authenticated Dictionary for Certificate Revocation., , , and . ISCC, page 238-243. IEEE Computer Society, (2003)A protocol for detecting malicious hosts based on limiting the execution time of mobile agents., , , and . ISCC, page 251-256. IEEE Computer Society, (2003)Practical Asymmetric Fingerprinting with a TTP., , , and . DEXA Workshops, page 352-356. IEEE Computer Society, (2003)?-error.">A class of non-linear asymptotic fingerprinting codes with ?-error., , and . Online Inf. Rev., 31 (1): 22-37 (2007)Development of a platform offering video copyright protection and security against illegal distribution., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 76-83. SPIE, (2005)