Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bassil, Carole
add a person with the name Bassil, Carole
 

Other publications of authors with the same name

Towards a new Security Architecture for Telephony., , and . ICN/ICONS/MCL, page 3. IEEE Computer Society, (2006)A Framework for Disseminating Trusted Safety Message in V2V Communication., , and . AINA Workshops, page 518-525. IEEE Computer Society, (2016)Critical vpn security analysis and new approach for securing voip communications over vpn networks., , and . WMuNeP, page 92-96. ACM, (2007)Simple voice security protocol., , and . IWCMC, page 367-372. ACM, (2006)VANet security challenges and solutions: A survey., , , and . Veh. Commun., (2017)Privacy using mobile cloud computing., , , , and . DICTAP, page 178-182. IEEE, (2015)Critical Analysis and New Perspective for Securing Voice Networks., , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 810-818. Springer, (2005)A Trusted Group-Based Revocation Process for Intelligent Transportation System., , , and . ICDEc, volume 358 of Lecture Notes in Business Information Processing, page 133-146. Springer, (2019)VPN Analysis and New Perspective for Securing Voice over VPN Networks., , and . ICNS, page 73-78. IEEE Computer Society, (2008)Group-based authentication in V2V communications., , , and . DICTAP, page 173-177. IEEE, (2015)