Certificate management in ad hoc networks
Morogan, M.C., Muftic, S.
Published in 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings (2003)
Published in 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings (2003)
Get full text
Conference Proceeding
Measurement of Energy Costs of Security in Wireless Sensor Nodes
Chih-Chun Chang, Muftic, S., Nagel, D.J.
Published in 2007 16th International Conference on Computer Communications and Networks (01.08.2007)
Published in 2007 16th International Conference on Computer Communications and Networks (01.08.2007)
Get full text
Conference Proceeding
Location-Based Authentication and Authorization Using Smart Phones
Feng Zhang, Kondoro, A., Muftic, S.
Published in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (01.06.2012)
Published in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (01.06.2012)
Get full text
Conference Proceeding
MagicNET: Security architecture for discovery and adoption of mobile agents
Shibli, M A, Muftic, S
Published in 2009 Proceedings of the 1st International Workshop on Security and Communication Networks (01.05.2009)
Get full text
Published in 2009 Proceedings of the 1st International Workshop on Security and Communication Networks (01.05.2009)
Conference Proceeding
MagicNET: Security architecture for creation, classification, and validation of trusted mobile agents
Shibli, M.A., Muftic, S.
Published in 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS, - UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER (01.02.2009)
Get full text
Published in 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS, - UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER (01.02.2009)
Conference Proceeding
Secure healthcare information exchange for local domains
Hembroff, G C, Muftic, S
Published in 2009 3rd International Conference on Pervasive Computing Technologies for Healthcare (01.03.2009)
Published in 2009 3rd International Conference on Pervasive Computing Technologies for Healthcare (01.03.2009)
Get full text
Conference Proceeding
SAMSON: Secure access for medical smart cards over networks
Hembroff, G C, Muftic, S
Published in 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) (01.06.2010)
Published in 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) (01.06.2010)
Get full text
Conference Proceeding
Web Contents Protection, Secure Execution and Authorized Distribution
Abbasi, A G, Muftic, S, Hotamov, I
Published in 2010 Fifth International Multi-conference on Computing in the Global Information Technology (01.09.2010)
Published in 2010 Fifth International Multi-conference on Computing in the Global Information Technology (01.09.2010)
Get full text
Conference Proceeding
A Design of an Access Control Model for Multilevel-Security Documents
Alhammouri, M., Muftic, S.
Published in 2008 10th International Conference on Advanced Communication Technology (01.02.2008)
Published in 2008 10th International Conference on Advanced Communication Technology (01.02.2008)
Get full text
Conference Proceeding
MagicNET: Security System for Development, Validation and Adoption of Mobile Agents
Shibli, M.A., Muftic, S., Giambruno, A., Lioy, A.
Published in 2009 Third International Conference on Network and System Security (01.10.2009)
Published in 2009 Third International Conference on Network and System Security (01.10.2009)
Get full text
Conference Proceeding
CryptoNET: Secure federation protocol and authorization policies for SMI
Abbasi, A.G., Muftic, S., Schmolzer, G.
Published in 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009) (01.10.2009)
Published in 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009) (01.10.2009)
Get full text
Conference Proceeding
MagicNET: XACML authorization policies for mobile agents
Giambruno, A., Shibli, M.A., Muftic, S., Lioy, A.
Published in 2009 International Conference for Internet Technology and Secured Transactions, (ICITST) (01.11.2009)
Published in 2009 International Conference for Internet Technology and Secured Transactions, (ICITST) (01.11.2009)
Get full text
Conference Proceeding
A model and design of a security provider for Java applications
Abbasi, A.G., Muftic, S., Schmolzer, G.
Published in 2009 International Conference for Internet Technology and Secured Transactions, (ICITST) (01.11.2009)
Published in 2009 International Conference for Internet Technology and Secured Transactions, (ICITST) (01.11.2009)
Get full text
Conference Proceeding
Vulnerability analysis and patches management using secure mobile agents
Stirparo, P., Shibli, M.A., Muftic, S.
Published in 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS, - UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER (01.02.2009)
Get full text
Published in 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS, - UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER (01.02.2009)
Conference Proceeding
Assessment of Energy Consumption in Wireless Sensor Networks: A Case Study for Security Algorithms
Chih-Chun Chang, Nagel, D.J., Muftic, S.
Published in 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems (01.10.2007)
Published in 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems (01.10.2007)
Get full text
Conference Proceeding
Security in Operational Wireless Sensor Networks
Chih-Chun Chang, Muftic, S., Nagel, D.J.
Published in 2008 5th IEEE Consumer Communications and Networking Conference (01.01.2008)
Published in 2008 5th IEEE Consumer Communications and Networking Conference (01.01.2008)
Get full text
Conference Proceeding
Key Establishment Protocol for Wireless Sensor Networks
Chih-Chun Chang, Arafa, S., Muftic, S.
Published in 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems (01.10.2007)
Published in 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems (01.10.2007)
Get full text
Conference Proceeding