Author of the publication

A Trust Point-based Security Architecture for Sensor Data in the Cloud.

, , , and . Trusted Cloud Computing, Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mesh-DHT: A locality-based distributed look-up structure for Wireless Mesh Networks., , , and . ICC, page 653-658. IEEE, (2012)SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services., , , , and . TrustCom, page 525-532. IEEE Computer Society, (2012)SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators., , , , , , , , , and . CoRR, (2013)Security Challenges in the IP-based Internet of Things., , , , , and . Wireless Personal Communications, 61 (3): 527-542 (2011)The Cloud Needs Cross-Layer Data Handling Annotations., , and . IEEE Symposium on Security and Privacy Workshops, page 18-22. IEEE Computer Society, (2013)PiSA-SA: Municipal Wi-Fi Based on Wi-Fi Sharing., , , , , , and . ICCCN, page 1-8. IEEE, (2010)Standards-based end-to-end IP security for the Internet of Things., and . ICNP, page 1-3. IEEE Computer Society, (2013)Cooperative Wi-Fi-sharing: Encouraging fair play., , , , , and . Kaleidoscope, page 1-8. IEEE, (2011)Collaborative municipal Wi-Fi networks - challenges and opportunities., , , , , and . PerCom Workshops, page 588-593. IEEE Computer Society, (2010)Tailoring end-to-end IP security protocols to the Internet of Things., , , , and . ICNP, page 1-10. IEEE Computer Society, (2013)