Author of the publication

Identity Management in Federated Telecommunications Systems

, , , and . Proceedings of the Workshop on Standards for Privacy in User-Centric Identity Management, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond Technology: The Missing Pieces for QoS Success, , , , , , and . ACM SIGCOM RIPQoS workshop, (August 2003)Identity Management in Federated Telecommunications Systems, , , and . Proceedings of the Workshop on Standards for Privacy in User-Centric Identity Management, (2006)Generic Extensions of WWW Browsers., and . USENIX Workshop on Electronic Commerce, USENIX Association, (1995)Uncovering Human-to-Human Physical Interactions that Underlie Emotional and Affective Touch Communication., , , , and . WHC, page 407-412. IEEE, (2019)Robust and Secure Password and Key Change Method., , , , and . ESORICS, volume 875 of Lecture Notes in Computer Science, page 107-122. Springer, (1994)Imaging the 3-D deformation of the finger pad when interacting with compliant materials., and . HAPTICS, page 7-13. IEEE, (2018)Instrumentino: An open-source modular Python framework for controlling Arduino based experimental instruments., , and . Comput. Phys. Commun., 185 (10): 2724-2729 (2014)Reducing the Cost of Security in Link-State Routing., , and . NDSS, page 93-101. IEEE Computer Society, (1997)Does Licensing Require New Access Control Techniques?. Commun. ACM, 37 (11): 48-55 (1994)Force-Rate Cues Reduce Object Deformation Necessary to Discriminate Compliances Harder than the Skin., and . IEEE Trans. Haptics, 11 (2): 232-240 (2018)