Author of the publication

Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems.

, , , , and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 414-426. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture., , and . IPDPS, IEEE Computer Society, (2002)Robust Remote Authentication for Scalable Web-Based Services., , , and . IIH-MSP, page 1113-1117. IEEE Computer Society, (2008)Trust Based Routing for Misbehavior Detection in Ad Hoc Networks., , , , , and . JNW, 5 (5): 551-558 (2010)Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions., , and . J. Cryptology, 14 (2): 137-150 (2001)Several classes of binary sequences with three-level autocorrelation., , and . IEEE Trans. Information Theory, 45 (7): 2606-2612 (1999)Towards Energy-Efficient Secure Communications Using Biometric Key Distribution in Wireless Biomedical Healthcare Networks., , , , and . BMEI, page 1-5. IEEE, (2009)Undeniable Billing in Mobile Communication., and . MobiCom, page 284-290. ACM, (1998)Ubiquitous and Secure Certificate Service for Wireless Ad Hoc Network., , , and . IEICE Transactions, 93-D (7): 1848-1856 (2010)Improving Spectrum Management for Satellite Communication Systems With Hunger Marketing., , , , , and . IEEE Wireless Commun. Letters, 8 (3): 797-800 (2019)Using Blockchain to Control Access to Cloud Data., , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 274-288. Springer, (2018)