Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and confidentiality in health care informatics., , , , and . ACM Workshop on Role-Based Access Control, ACM, (1995)Secure Workflow Environment., and . WETICE, page 269-276. IEEE Computer Society, (1997)Summary Report on Enterprise Security Workshop., and . WETICE, page 139-140. IEEE Computer Society, (2000)Performance Simulation of Hybrid-Ethernet., , , and . Int. Journal in Computer Simulation, (1994)Introduction.. WETICE, page 294. IEEE Computer Society, (1998)Final Summary Report on Enterprise Security., , , and . WETICE, page 134. IEEE Computer Society, (1999)MediaWare: a distributed multimedia environment with interoperability., and . WETICE, page 128-137. IEEE Computer Society, (1995)Cryptographic Key Recovery.. FTDCS, page 34-39. IEEE Computer Society, (1997)Future Trends in Internet Security.. FTDCS, page 216-217. IEEE Computer Society, (1997)Multimedia on the Internet: Emerging Technolgoy.. COMPSAC, page 146. IEEE Computer Society, (1996)