Personensuche
X
?
Mobile, Secure, and Programmable Networking; Lecture Notes in Computer Science ,
2
Position Paper: Strengthening Applets on Legacy SIM Cards w..:
, In:
?
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking ,
5
Demonstrating Liability and Trust Metrics for Multi-Actor, ..:
, In:
?
2022 IEEE 8th International Conference on Network Softwarization (NetSoft) ,
6
TRAILS: Extending TOSCA NFV profiles for liability manageme..:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
7
The Owner, the Provider and the Subcontractors: How to Hand..:
, In:
?
2022 9th International Conference on Future Internet of Things and Cloud (FiCloud) ,
9
Security Constraints for Placement of Latency Sensitive 5G ..:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
11
INSPIRE-5Gplus : intelligent security and pervasive trus..:
, In:
?
Advances in Intelligent Systems and Computing; Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018) ,
13
Security and Usability: A Naturalistic Experimental Evaluat..:
, In:
?
2017 IEEE Trustcom/BigDataSE/ICESS ,
15