Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Whole exome sequencing analysis pipeline for the discovery of mutations causative of human rare diseases., , , , , , , , , and 1 other author(s). IWBBIO, page 253-254. Copicentro Editorial, (2013)Characterizing Normal and Pathological Gait through Permutation Entropy., , , , , , and . Entropy, 20 (1): 77 (2018)Modeling and Simulation of Upper Brachial Plexus Injury., , , , , and . IEEE Syst. J., 10 (3): 912-921 (2016)A Novel Method to Maintain Privacy in Mobile Agent Applications., , , , and . CANS, volume 3810 of Lecture Notes in Computer Science, page 247-260. Springer, (2005)A security framework for a workflow-based grid development platform., , , and . Comput. Stand. Interfaces, 32 (5-6): 230-245 (2010)Anonymity analysis in credentials-based systems: A formal framework., , and . Comput. Stand. Interfaces, 30 (4): 253-261 (2008)WASAM: A dynamic wide-area situational awareness model for critical domains in Smart Grids., and . Future Gener. Comput. Syst., (2014)Virtual certificates and synthetic certificates: new paradigms for improving public key validation., , , and . Comput. Commun., 26 (16): 1826-1838 (2003)A First Approach to Provide Anonymity in Attribute Certificates., , , and . Public Key Cryptography, volume 2947 of Lecture Notes in Computer Science, page 402-415. Springer, (2004)On the energy cost of authenticated key agreement in wireless sensor networks., , and . Wirel. Commun. Mob. Comput., 12 (1): 133-143 (2012)