|
Search the dblp DataBase
Antonio Muñoz:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Antonio Mana, Antonio Muñoz
Protected computing vs. trusted computing. [Citation Graph (0, 0)][DBLP] COMSWARE, 2006, pp:- [Conf]
- Antonio Muñoz, Jose Antonio Onieva, Javier Lopez
On Secure Profiling. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2005, pp:214-218 [Conf]
- Thomas Czernichow, Antonio Muñoz
A Probability Estimation Based Criteria for Model Evaluation. [Citation Graph (0, 0)][DBLP] ICANN, 1997, pp:1029-1034 [Conf]
- Antonio Maña, Francisco Sanchez, Daniel Serrano, Antonio Muñoz
Towards Secure Ambient Intelligence Scenarios. [Citation Graph (0, 0)][DBLP] SEKE, 2006, pp:386-391 [Conf]
- Javier Lopez, Antonio Maña, Antonio Muñoz
A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. [Citation Graph (0, 0)][DBLP] UIC, 2006, pp:977-987 [Conf]
- Sigrid Gürgens, Carsten Rudolph, Antonio Maña, Antonio Muñoz
Facilitating the Use of TPM Technologies through S&D Patterns. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2007, pp:765-769 [Conf]
- Antonio Maña, Antonio Muñoz
Trusted Code Execution in JavaCard. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:269-279 [Conf]
- Antonio Maña, Antonio Muñoz, Daniel Serrano
Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence. [Citation Graph (0, 0)][DBLP] UIC, 2007, pp:1201-1212 [Conf]
SecMiLiA: An Approach in the Agent Protection. [Citation Graph (, )][DBLP]
AVISPA in the Validation of Ambient Intelligence Scenarios. [Citation Graph (, )][DBLP]
Agent Protection Based on the Use of Cryptographic Hardware. [Citation Graph (, )][DBLP]
Security and Dependability in Ambient Intelligence Scenarios - The Communication Prototype. [Citation Graph (, )][DBLP]
In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware. [Citation Graph (, )][DBLP]
Security Patterns, Towards a Further Level. [Citation Graph (, )][DBLP]
Hardware Protection of Agents in Ubiquitous and Ambient Intelligence Environments. [Citation Graph (, )][DBLP]
Protected Computing Approach: Towards the Mutual Protection of Agent Computing. [Citation Graph (, )][DBLP]
Trusted Computing: The Cornerstone in the Secure Migration Library for Agents. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|