Search for persons
X
?
Innovative Security Solutions for Information Technology and Communications; Lecture Notes in Computer Science ,
1
Limited Proxying for Content Filtering Based on X.509 Proxy..:
, In:
?
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead ,
4
Formal derivation of security design specifications from se..:
, In:
?
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead ,
5
A rigorous methodology for security architecture modeling a..:
, In:
?
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks ,
6
Securing the AODV protocol using specification-based intrus..:
, In:
?
Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks ,
7