Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Mobile Devices into Semantic Services Environments, , and . Proceedings of the 2008 The Fourth International Conference on Wireless and Mobile Communications, page 137--143. Washington, DC, USA, IEEE Computer Society, (2008)License Transfer Mechanisms through Seamless SIM Authentication - Rights Management based on SIM Keys., , and . WINSYS, page 333-338. INSTICC Press, (2006)A Methodology for Security Classification applied to Smart Grid Infrastructures., , , and . Int. J. Crit. Infrastructure Prot., (2020)Privacy Labelling and the Story of Princess Privacy and the Seven Helpers., , , , , , , , and . CoRR, (2020)Sociality brings Security in Content Sharing., , , and . J. Comput., 5 (12): 1839-1846 (2010)Semantically supported Authentication and Privacy in Social Networks., , , and . SECURWARE, page 83-88. IEEE Computer Society, (2007)SemID: Combining Semantics with Identity Management., , , and . SECURWARE, page 18-23. IEEE Computer Society, (2007)Security and Privacy Functionalities in IoT., , and . PST, page 1-12. IEEE, (2019)Building Trustable Remote Monitoring and Management Systems., , and . UCC Companion, page 213-219. IEEE, (2018)Security for Ambient Wireless Services., , and . VTC Spring, page 298-303. IEEE, (2007)