The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Antonio Muñoz: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Antonio Mana, Antonio Muñoz
    Protected computing vs. trusted computing. [Citation Graph (0, 0)][DBLP]
    COMSWARE, 2006, pp:- [Conf]
  2. Antonio Muñoz, Jose Antonio Onieva, Javier Lopez
    On Secure Profiling. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:214-218 [Conf]
  3. Thomas Czernichow, Antonio Muñoz
    A Probability Estimation Based Criteria for Model Evaluation. [Citation Graph (0, 0)][DBLP]
    ICANN, 1997, pp:1029-1034 [Conf]
  4. Antonio Maña, Francisco Sanchez, Daniel Serrano, Antonio Muñoz
    Towards Secure Ambient Intelligence Scenarios. [Citation Graph (0, 0)][DBLP]
    SEKE, 2006, pp:386-391 [Conf]
  5. Javier Lopez, Antonio Maña, Antonio Muñoz
    A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:977-987 [Conf]
  6. Sigrid Gürgens, Carsten Rudolph, Antonio Maña, Antonio Muñoz
    Facilitating the Use of TPM Technologies through S&D Patterns. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:765-769 [Conf]
  7. Antonio Maña, Antonio Muñoz
    Trusted Code Execution in JavaCard. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:269-279 [Conf]
  8. Antonio Maña, Antonio Muñoz, Daniel Serrano
    Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:1201-1212 [Conf]

  9. SecMiLiA: An Approach in the Agent Protection. [Citation Graph (, )][DBLP]


  10. AVISPA in the Validation of Ambient Intelligence Scenarios. [Citation Graph (, )][DBLP]


  11. Agent Protection Based on the Use of Cryptographic Hardware. [Citation Graph (, )][DBLP]


  12. Security and Dependability in Ambient Intelligence Scenarios - The Communication Prototype. [Citation Graph (, )][DBLP]


  13. In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware. [Citation Graph (, )][DBLP]


  14. Security Patterns, Towards a Further Level. [Citation Graph (, )][DBLP]


  15. Hardware Protection of Agents in Ubiquitous and Ambient Intelligence Environments. [Citation Graph (, )][DBLP]


  16. Protected Computing Approach: Towards the Mutual Protection of Agent Computing. [Citation Graph (, )][DBLP]


  17. Trusted Computing: The Cornerstone in the Secure Migration Library for Agents. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002