Publications

Clear filters
53 result(s)

, , , , , , , , , and , Deliverable 1.2. 1: The conceptual structure of user profiles, In , .

, , , , , and , Scenario construction and personalization of PN services based on user profiles and context information, In Proc. of IST Mobile and Wireless Summit, Myconos, volume 24, (Pages: 182–193), .

, , , , , , , , and , The conceptual structure of user profiles, In , MAGNET Beyond, .

, and , Ubiquitous access control and policy management in personal networks, In 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems-Workshops, (Pages: 1–6), .

and , Personal networks: Security risks and solutions, In 45th FITCE Congress: Telecom Wars, .

, , , , , and , Overview of a personal network prototype, In IEC Annual Review of Communications, volume 59, (Pages: 521–534), .

, , , , and , An Architecture for Secure Wide-Area Service Discovery in Personal Peer-to-Peer Networks, In IST Mobile & Wireless Communications Summit, Mykonos, Greece, .

, , , , , , , , , and , Draft User Functionalities and Interfaces of PN Services (Low-Fi Prototyping), In , .

, , , , and , Implementation and evaluation of the service level security architecture, In , .

, , , , , , , , , and , Overall secure PN architecture, In , .

Skip to content