Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems., , and . Computer Networks, 53 (10): 1628-1648 (2009)Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks., , and . IJDSN, (2015)Microservices: Migration of a Mission Critical System., , , and . CoRR, (2017)Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer., , and . CoRR, (2017)High-level algorithms and data structures requirements for security-by-contract on Java cards., , , and . IJCCBS, 3 (4): 284-304 (2012)When the Price Is Your Privacy: A Security Analysis of Two Cheap IoT Devices., , , , and . SEDA, volume 925 of Advances in Intelligent Systems and Computing, page 55-75. Springer, (2018)A Peer-to-Peer Knowledge Level Open Service Architecture., , and . Wissensmanagement, page 195-201. DFKI, Kaiserslautern, (2005)Where Are All the Agents? On the Gap between Theory and Practice of Agent-Based Referral Networks.. PRIMA, volume 5925 of Lecture Notes in Computer Science, page 508-515. Springer, (2009)Performative Patterns for Designing Verifiable ACLs., and . CIA, volume 4149 of Lecture Notes in Computer Science, page 375-387. Springer, (2006)Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs., , , and . NordSec, volume 8208 of Lecture Notes in Computer Science, page 1-16. Springer, (2013)