Author of the publication

Security Analysis of the Utilization of Corba Object References as Authorization Tokens.

, , and . ISORC, page 196-203. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison of FPGA-based implementation alternatives for complex algorithms in networked embedded systems - the encryption example., , , and . ETFA, page 1449-1456. IEEE, (2008)Security Analysis of the Utilization of Corba Object References as Authorization Tokens., , and . ISORC, page 196-203. IEEE Computer Society, (2007)Protecting the Itinerary of Mobile Agents., , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 301. Springer, (1998)A Pessimistic Approach to Trust in Mobile Agent Platforms., , and . IEEE Internet Comput., 4 (5): 40-48 (2000)Cryptographic Protection of Connection Integrity with Interruption Detection in TINA., and . DAIS, Chapman & Hall, (1997)Workshop on Electronic Commerce - Foreword., and . SRDS, page 329. IEEE Computer Society, (1999)Extensions to an authentication technique proposed for the global mobility network., , , and . IEEE Trans. Communications, 48 (3): 373-376 (2000)An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection.. AFRICACRYPT, volume 7918 of Lecture Notes in Computer Science, page 392-405. Springer, (2013)A Simple Logic for Authentication Protocol Design., , and . CSFW, page 153-162. IEEE Computer Society, (1998)Closed user groups in Internet service centres., , , , , and . DAIS, volume 143 of IFIP Conference Proceedings, page 439-. Kluwer, (1999)