Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis., , and . IM, page 89-97. IFIP, (2019)PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications., , , , and . POLICY, page 129-132. IEEE Computer Society, (2011)Secure Mobile and Wireless Communication Services for Collaborative Virtual Gaming., , , , , , , , and . CTS, page 363-369. IEEE Computer Society, (2006)Mediating Distribution Models and Access Control for the Exchange of Learning Objects., , and . ICALT, page 714-715. IEEE Computer Society, (2009)Authentication and Authorisation for Widget-based Applications in a Loosely-coupled Web eLearning Environment., and . WEBIST (1), page 17-26. SciTePress, (2014)Re-engineering the Uptake of ICT in Schools., , , , , , , , , and 2 other author(s). EC-TEL, volume 8095 of Lecture Notes in Computer Science, page 645-646. Springer, (2013)LIMBS: Open Source, Open Standards, and Open Content To Foster Learning Resource Exchanges., and . ICALT, page 682-686. IEEE Computer Society, (2006)A Federated Authorization Service for Bridging Learning Object Distribution Models., , and . ICWL, volume 5686 of Lecture Notes in Computer Science, page 116-125. Springer, (2009)Adaptive Risk-Aware Access Control Model for Internet of Things., and . SIoT, page 40-49. IEEE, (2017)A Distributed Local-Optimum Distance Vector Algorithm for the Metarouting Approach., , and . ICC, page 1-6. IEEE, (2011)