Author of the publication

QoS-Differentiated Secure Charging in Ad-Hoc Environments.

, , , , and . ICT, volume 3124 of Lecture Notes in Computer Science, page 1093-1100. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting digital identities in future networks., , , and . Future Network & Mobile Summit, page 1-8. IEEE, (2011)Identities in the Future Internet of Things., and . Wireless Personal Communications, 49 (3): 353-363 (2009)Privacy-enabled identity management in the Future Internet., , and . Future Internet Assembly, page 57-66. IOS Press, (2009)MobiSplit in a Virtualized, Multi-Device Environment., , , , , and . ICC, page 1839-1845. IEEE, (2007)Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks., , and . ICC, page 2288-2295. IEEE, (2006)Linking Ad Hoc Charging Schemes to AAAC Architectures., , , , and . ESAS, volume 3313 of Lecture Notes in Computer Science, page 66-81. Springer, (2004)Secure Comparison of Encrypted Data in Wireless Sensor Networks., , and . WiOpt, page 47-53. IEEE Computer Society, (2005)Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation., , and . IEEE Trans. Mob. Comput., 5 (10): 1417-1431 (2006)TRIMS, a privacy-aware trust and reputation model for identity management systems., , and . Computer Networks, 54 (16): 2899-2912 (2010)A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing., , , and . Computer Communications, 31 (4): 734-749 (2008)