Author of the publication

The Pervasive Workflow: A Decentralized Workflow System Supporting Long-Running Transactions.

, , and . IEEE Trans. Syst. Man Cybern. Part C, 38 (3): 319-333 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling adaptive and secure extranets., , , and . Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 123-135. Kluwer, (2002)Information Confinement, Privacy, and Security in RFID Systems., and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 187-202. Springer, (2007)Policy-based encryption schemes from bilinear pairings., , and . AsiaCCS, page 368. ACM, (2006)Identity Based Message Authentication for Dynamic Networks., and . SEC, volume 201 of IFIP, page 50-61. Springer, (2006)Embedded Proofs for Verifiable Neural Networks., , and . IACR Cryptology ePrint Archive, (2017)Policy-Based Cryptography and Applications., and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 72-87. Springer, (2005)A Leakage-Abuse Attack Against Multi-User Searchable Encryption., , and . Proc. Priv. Enhancing Technol., 2017 (3): 168 (2017)Security in Open Networks and Distributed Systems., and . Comput. Networks ISDN Syst., 22 (5): 232-346 (1991)Privacy and confidentiality in context-based and epidemic forwarding., , and . Comput. Commun., 33 (13): 1493-1504 (2010)Automating the Composition of Transactional Web Services., , and . Int. J. Web Serv. Res., 5 (1): 24-41 (2008)