Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Confidentiality for Mobile Code: The Case of a Simple Payment Protocol., and . CSFW, page 233-244. IEEE Computer Society, (2000)Secure Negotiation in Virtual Organizations., , and . EDOC Workshops, page 48. IEEE Computer Society, (2006)On the Secure Implementation of Security Protocols., and . ESOP, volume 2618 of Lecture Notes in Computer Science, page 144-158. Springer, (2003)On the secure implementation of security protocols., and . Sci. Comput. Program., 50 (1-3): 73-99 (2004)Language-based support for service oriented architectures: Future directions., , , and . ICSOFT (1), page 339-344. INSTICC Press, (2006)Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures., , , , , , , , and . CEC Workshops, page 3-11. IEEE Computer Society, (2005)Contract-Oriented Software Development for Internet Services., , , and . ERCIM News, (2008)On the Expressiveness of Infinite Behavior and Name Scoping in Process Calculi., , and . FoSSaCS, volume 2987 of Lecture Notes in Computer Science, page 226-240. Springer, (2004)The TrustCoM Approach to Enforcing Agreements between Interoperating Enterprises., , , , , , , , , and 7 other author(s). I-ESA, page 365-375. Springer, (2006)