Author of the publication

Performance analysis of a cross-layer SSO mechanism for a roaming infrastructure.

, , , and . J. Netw. Comput. Appl., 32 (4): 808-823 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Use of XACML Policies for a Network Access Control Service., , and . IWAP, volume 128 of Frontiers in Artificial Intelligence and Applications, page 111-122. IOS Press, (2005)Smartcard-Based e-Coin for Electronic Payments on the (Mobile) Internet., , and . SITIS, page 361-368. IEEE Computer Society, (2007)AI-driven Teacher Analytics: Informative Insights on Classroom Activities., , and . TALE, page 1-8. IEEE, (2023)Managing the lifecycle of XACML delegation policies in federated environments., , , and . SEC, volume 278 of IFIP, page 717-721. Springer, (2008)The MPI-Delphi Interface: A Visual Programming Environment for Clusters of Workstations., , , and . PDPTA, page 1730-1736. CSREA Press, (1999)Towards a generic per-fee-link framework., , and . ICDIM, page 37-42. IEEE, (2007)Learning Technological Innovation on Mobile Applications by Means of a Spiral of Projects., and . ICL (2), volume 545 of Advances in Intelligent Systems and Computing, page 16-28. Springer, (2016)Levels of Assurance and Reauthentication in Federated Environments., , , and . EuroPKI, volume 5057 of Lecture Notes in Computer Science, page 89-103. Springer, (2008)Formal description of the SWIFT identity management framework., , , and . Future Gener. Comput. Syst., 27 (8): 1113-1123 (2011)Performance analysis of a cross-layer SSO mechanism for a roaming infrastructure., , , and . J. Netw. Comput. Appl., 32 (4): 808-823 (2009)