Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols., , and . Peer-to-Peer Networking and Applications, 5 (3): 231-243 (2012)On User Availability Prediction and Network Applications., , , and . IEEE/ACM Trans. Netw., 23 (4): 1300-1313 (2015)Bringing Common Criteria Certification to Web Services., , and . SERVICES, page 98-102. IEEE Computer Society, (2013)A Game Theoretic Model of a Protocol for Data Possession Verification., , and . WOWMOM, page 1-6. IEEE Computer Society, (2007)SysML-Sec - A Model Driven Approach for Designing Safe and Secure Systems., and . MODELSWARD, page 655-664. SciTePress, (2015)SysML-Sec Attack Graphs: Compact Representations for Complex Attacks., and . GraMSec@CSF, volume 9390 of Lecture Notes in Computer Science, page 35-49. Springer, (2015)Trust and Authorization in Pervasive B2E Scenarios., , , and . ISC, volume 2851 of Lecture Notes in Computer Science, page 295-309. Springer, (2003)Effective and Efficient Security Policy Engines for Automotive On-Board Networks., and . Nets4Cars/Nets4Trains, volume 7266 of Lecture Notes in Computer Science, page 14-26. Springer, (2012)Formal specification of security guidelines for program certification., , and . TASE, page 1-8. IEEE Computer Society, (2017)Securing Ad Hoc Storage through Probabilistic Cooperation Assessment., and . Electron. Notes Theor. Comput. Sci., 192 (2): 17-29 (2008)