antonio kung
antonio kung
Verified email at
Cited by
Cited by
Secure vehicular communication systems: design and architecture
P Papadimitratos, L Buttyan, T Holczer, E Schoch, J Freudiger, M Raya, ...
IEEE Communications Magazine 46 (11), 100-109, 2008
Secure vehicular communication systems: implementation, performance, and research challenges
F Kargl, P Papadimitratos, L Buttyan, M Müter, E Schoch, B Wiedersheim, ...
IEEE Communications magazine 46 (11), 110-118, 2008
Architecture for secure and private vehicular communications
P Papadimitratos, L Buttyan, JP Hubaux, F Kargl, A Kung, M Raya
2007 7th International Conference on ITS Telecommunications, 1-6, 2007
Privacy and identity management for vehicular communication systems: a position paper
P Papadimitratos, A Kung, JP Hubaux, F Kargl
Workshop on standards for privacy in user-centric identity management, 2006
PRIPARE: integrating privacy best practices into a privacy engineering methodology
N Notario, A Crespo, YS Martín, JM Del Alamo, D Le Métayer, T Antignac, ...
2015 IEEE Security and Privacy Workshops, 151-158, 2015
PEARs: privacy enhancing architectures
A Kung
Annual Privacy Forum, 18-29, 2014
Privacy-by-design in its applications
A Kung, JC Freytag, F Kargl
2011 IEEE International Symposium on a World of Wireless, Mobile and …, 2011
Platforms for AAL applications
G Fagerberg, A Kung, R Wichert, MR Tazari, B Jean-Bart, G Bauer, ...
European Conference on Smart Sensing and Context, 177-201, 2010
Privacy verification using ontologies
M Kost, JC Freytag, F Kargl, A Kung
2011 Sixth International Conference on Availability, Reliability and …, 2011
Methods and tools for GDPR compliance through privacy and data protection engineering
YS Martin, A Kung
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2018
Making AAL platforms a reality
A Kung, B Jean-Bart
International Joint Conference on Ambient Intelligence, 187-196, 2010
Deliverable D2. 3: Security requirements for automotive on-board networks based on dark-side scenarios
A Ruddle, D Ward, B Weyl, S Idrees, Y Roudier, M Friedewald, ...
EVITA project, 2009
VANETS security requirements final version
R Kroh
http://www. sevecom. org/Presentations/2006-09_Budapest/Sevecom_2006-09-04_B …, 2006
How to overcome the market entrance barrier and achieve the market breakthrough in AAL
R Wichert, F Furfari, A Kung, MR Tazari
Ambient assisted living, 349-358, 2012
How to overcome the market entrance barrier and achieve the market breakthrough in AAL
R Wichert, F Furfari, A Kung, MR Tazari
Ambient assisted living, 349-358, 2012
European ITS communication architecture—Overall framework—Proof of concept implementation
R Bossom, R Brignolo, T Ernst, K Evensen, A Frötscher, W Höfs, ...
EC FP7 Deliverable, EC Information Society Technologies Programme, Tech. Rep, 2009
Flex‐eWare: a flexible model driven solution for designing and implementing embedded distributed systems
M Jan, C Jouvray, F Kordon, A Kung, J Lalande, F Loiret, J Navas, ...
Software: Practice and Experience 42 (12), 1467-1494, 2012
A privacy engineering framework for the internet of things
A Kung, F Kargl, S Suppan, J Cuellar, HC Pöhls, A Kapovits, ...
Data Protection and Privacy:(In) visibilities and Infrastructures, 163-202, 2017
The EHS European Home Systems Network
A Kung
Aticon, 1995
Security architecture and mechanisms for V2V/V2I
A Kung
Public deliverable D 2, 2008
The system can't perform the operation now. Try again later.
Articles 1–20