Author of the publication

Securing Communications in the Smart Home.

, and . EUC, volume 3207 of Lecture Notes in Computer Science, page 891-902. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysing the Security Threats against Network Convergence Architectures., , , , and . IAS, page 241-246. IEEE Computer Society, (2007)Securing Communications in the Smart Home., and . EUC, volume 3207 of Lecture Notes in Computer Science, page 891-902. Springer, (2004)Ad Hoc Networks: Security., and . Encyclopedia of Wireless and Mobile Communications, (2008)Real-Time Intrusion Detection for Ad Hoc Networks., , and . WOWMOM, page 374-380. IEEE Computer Society, (2005)Performance Analysis of Cryptographic Protocols on Handheld Devices., , , and . NCA, page 169-174. IEEE Computer Society, (2004)TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments., , , and . GLOBECOM, page 1979-1984. IEEE, (2008)Towards Flexible Authorization Management., and . ISCC, page 421-426. IEEE Computer Society, (2005)Managing Policies for Dynamic Spectrum Access., , , , , , , and . Autonomic Networking, volume 4195 of Lecture Notes in Computer Science, page 285-297. Springer, (2006)Secure routing for mobile ad hoc networks., and . IEEE Communications Surveys and Tutorials, 7 (1-4): 2-21 (2005)Collaborative service evaluation with the TwoHop trust framework., , and . Security and Communication Networks, 5 (6): 594-613 (2012)