Author of the publication

Towards adaptive security for convergent wireless sensor networks in beyond 3G environments.

, , , , , , , , and . Wireless Communications and Mobile Computing, 10 (9): 1193-1207 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Requirements of e-Government Services: An Organizational Framework., and . PDPTA, page 127-131. CSREA Press, (2002)Enhancing Web privacy and anonymity in the digital era.. Inf. Manag. Comput. Security, 12 (3): 255-287 (2004)PrivaKERB: A user privacy framework for Kerberos., , , , and . Computers & Security, 30 (6-7): 446-463 (2011)Designing secure RFID authentication protocols is (still) a non-trivial task., , and . NSS, page 73-80. IEEE, (2011)Unifying ISO Security Standards Practices into a Single Security Framework., , , and . SAISMC, page 188-203. University of Plymouth, (2010)Introducing PKI to Enhance Security in Future Mobile Networks., , and . SEC, volume 250 of IFIP Conference Proceedings, page 109-120. Kluwer, (2003)Introducing Ontology-based Security Policy Management in the Grid., and . ECIW, page 107-116. Academic Conferences Limited, Reading, UK, (2005)Security Education and Awareness for K-6 Going Mobile., , , and . iJIM, 10 (2): 41-48 (2016)Evolution and Trends in IoT Security., , and . IEEE Computer, 51 (7): 16-25 (2018)Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts., , , , , and . Computer Standards & Interfaces, 36 (4): 759-775 (2014)