Author of the publication

Advanced Grid Programming with Components: A Biometric Identification Case Study.

, , , , and . COMPSAC, page 401-408. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bringing strong authentication and transaction security to the realm of mobile devices., , , and . IBM Journal of Research and Development, (2014)The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks., , , , , and . TRUST, volume 4968 of Lecture Notes in Computer Science, page 75-91. Springer, (2008)IBM Secure Enterprise Desktop., , , , , , , , and . IBM Journal of Research and Development, (2014)Meeting the Application in User Space., , , , , and . ACM SIGOPS European Workshop, page 82-87. ACM, (1994)Secure password-based cipher suite for TLS., , , and . ACM Trans. Inf. Syst. Secur., 4 (2): 134-157 (2001)ePVM - An Embeddable Process Virtual Machine., , and . COMPSAC (1), page 557-564. IEEE Computer Society, (2007)Advanced Grid Programming with Components: A Biometric Identification Case Study., , , , and . COMPSAC, page 401-408. IEEE Computer Society, (2008)A Banking Server's Display on your Key Chain., , , , , and . ERCIM News, (2008)Secure Password-Based Cipher Suite for TLS., , , and . NDSS, The Internet Society, (2000)Flexible Persistence Support for State Machine-Based Workflow Engines., , and . ICSEA, page 313-319. IEEE Computer Society, (2009)