Trustworthiness assessment of wireless sensor data for business applications L Gomez, A Laube, A Sorniotti Advanced Information Networking and Applications, 2009. AINA'09 …, 2009 | 38 | 2009 |
Method and system for access control using resource filters L Gomez, A Laube US Patent 8,156,537, 2012 | 35 | 2012 |
Design guidelines for integration of wireless sensor networks with enterprise systems L Gomez, A Laube, A Sorniotti Proceedings of the 1st international conference on MOBILe Wireless …, 2008 | 34 | 2008 |
Design guidelines for integration of wireless sensor networks within enterprise systems L Gomez, A Laube, A Sorniotti In ACM Digital Library, editor, in the proceedings of the International …, 2008 | 34* | 2008 |
Security patterns for capturing encryption-based access control to sensor data A Cuevas, P El Khoury, L Gomez, A Laube The Second International Conference on Emerging Security Information …, 2008 | 26 | 2008 |
Efficient access control for wireless sensor data A Sorniotti, R Molva, L Gomez, C Trefois, A Laube, P Scaglioso International Journal of Wireless Information Networks 16 (3), 165, 2009 | 24 | 2009 |
Secure sensor networks for public safety command and control system L Gomez, A Laube, C Ulmer Technologies for Homeland Security, 2009. HST'09. IEEE Conference on, 59-66, 2009 | 22 | 2009 |
Method and system for performing an untraceable secret matching A Sorniotti, F Montagut, A Laube, R Molva, K Wrona, L Gomez US Patent 7,945,044, 2011 | 14 | 2011 |
A security pattern for untraceable secret handshakes A Cuevas, P El Khoury, L Gomez, A Laube, A Sorniotti Emerging Security Information, Systems and Technologies, 2009. SECURWARE'09 …, 2009 | 10 | 2009 |
Neglect and motion stimuli–insights from a touchscreen-based cancellation task S Hopfner, S Kesselring, D Cazzoli, K Gutbrod, A Laube-Rosenpflanzer, ... PloS one 10 (7), e0132025, 2015 | 8 | 2015 |
Ontological middleware for dynamic wireless sensor data processing L Gomez, A Laube Sensor Technologies and Applications, 2009. SENSORCOMM'09. Third …, 2009 | 8 | 2009 |
myIdP-the personal attribute hub A Laube, S Hauser The Fifth International Conferences on Advanced Service Computing, 1-5, 2013 | 7 | 2013 |
Policy chain for securing service oriented architectures W Arsac, A Laube, H Plate Data Privacy Management and Autonomous Spontaneous Security, 303-317, 2013 | 5 | 2013 |
Trustworthiness assessment of wireless sensor networks sensor data for business applications L Gomez, A Laube, A Sorniotti Proceedings of the IEEE International Conference on Advanced Information …, 2009 | 4 | 2009 |
Encryption-based access control for building management L Gomez, A Laube, V Ribiere, A Sorniotti, C Trefois, M Valente, ... Proceedings of the 5th Annual International Conference on Mobile and …, 2008 | 4 | 2008 |
LWESP: Light-Weight Exterior Sensornet Protocol A Cuevas, M Uruena, A Laube, L Gomez Computers and Communications, 2009. ISCC 2009. IEEE Symposium on, 913-919, 2009 | 3 | 2009 |
LWESP: Light-Weight Exterior Sensornet Protocol∗ A Laube, L Gomez | 3* | |
Generation of choreography skeletons from web service definitions A Laube, P Winkler Service Computation, 1-6, 2010 | 2 | 2010 |
Access control in mobile and ubiquitous environments L Gomez, A Laube, A Sorniotti Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability …, 2009 | 2 | 2009 |
myIdP-The personal attribute hub: prototype and quality of claims A Laube, S Hauser Int. J. Adv. Intell. Syst 7 (1), 1-10, 2014 | 1 | 2014 |