Author of the publication

Linking Ad hoc Charging Schemes to AAAC Architectures

, , , , and . 1st European Workshop on Security in Ad-Hoc and Sensor Networks, Heidelberg, Germany, ESAS 2004, Lecture Notes in Computer Science (LNCS), (August 2004)LNCS 3313.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets., and . CECC, page 16:1-16:6. ACM, (2019)CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks, , and . IEEE International Conference on Communications, Seoul, Korea, ICC2005, (May 2005)WSNs on the Road for Automobiles, , , and . Presentation, (March 2005)13th Wireless World Reseach Forum, Jeju Island, Korea.Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks, , and . IEEE International Conference on Communications, Istanbul, Turkey, ICC2006, (June 2006)A Survey on the Encryption of Convergecast-Traffic with In-Network Processing, , and . IEEE Transactions on Dependable and Secure Computing, (2008)to appear.Security Solutions for Wireless Sensor Networks, , and . NEC Journal of Advanced Technology, (June 2006)Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution and Routing Adaptation, , and . IEEE Transactions on Mobile Computing, (2006)A ROM-friendly Secure Code Update mechanism for WSNs using a stateful-verifier T-time Signature Scheme, , and . ACM Conference on Wireless Security, WiSec'09, ACM, (2009)to appear.Secure Comparison of Encrypted Data in Wireless Sensor Networks, , and . 3rd Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Trentino, Italy, WiOpt2005, (April 2005)Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks, , , and . Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, (2006)