Publications

Clear filters
50 result(s)

, and , A threat analysis methodology for security evaluation and enhancement planning, In 2009 Third International Conference on Emerging Security Information, Systems and Technologies, (Pages: 262–267), .

, , and , Trust and security in Personal Network environments, In International Journal of Electronic Security and Digital Forensics, Inderscience Publishers, volume 2, (Pages: 365–376), .

, , and , Privacy and resource protection in Personal Network Federations, In Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments, (Pages: 29), .

, and , Establishing trust through anonymous and private information exchange over personal networks, In Wireless Personal Communications, Springer US, volume 51, (Pages: 121–135), .

, , , , , , and , Security in PNs, In My personal Adaptive Global NET (MAGNET), Springer Science & Business Media, (Pages: 245), .

, , , and , An indoor localization platform for ambient assisted living using UWB, In Proceedings of the 6th international conference on advances in mobile computing and multimedia, (Pages: 178–182), .

, , , , , , and , Solutions for Identity, Management, Trust, and Privacy for PNs, In , .

, and , A security, privacy and trust architecture for wireless sensor networks, In 2008 50th International Symposium ELMAR, volume 2, (Pages: 523–529), .

, , , , and , Final Secure Extended Architecture, In , .

, , , , and , ToD Pilot: A Location-based Taxi on Demand System Demonstrator, In , .

Skip to content