Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack., , , and . IEEE Communications Letters, 16 (5): 619-621 (2012)Αυτόνομα και Ασφαλή Ασύρματα κατ΄ Απαίτηση Δίκτυα. University of Piraeus, Greece, (2009)National Archive of PhD Theses: oai:10442/18127.Adaptation of a Conference Key Distribution System for the wireless ad hoc network., , , , and . ICC, page 1-6. IEEE, (2017)On the conference key distribution system with user anonymity., , , and . J. Inf. Secur. Appl., (2020)Re-configuration from the Edge: alternative Software Models for time-sensitive IoT Applications., , , and . ISCC, page 1-3. IEEE, (2022)Securing wireless sensor networks towards a trusted "Internet of Things"., , , , , , , , , and 2 other author(s). Future Internet Assembly, page 47-56. IOS Press, (2009)SAnoVS: Secure anonymous voting scheme for clustered ad hoc networks., , and . ISCC, page 192-196. IEEE Computer Society, (2013)A cooperative framework towards self-protection and self-organization in Mobile Ad Hoc Networks., , and . ICC, page 5922-5927. IEEE, (2015)An evaluation of the middleware's impact on the performance of object oriented distributed systems., , and . J. Syst. Softw., 80 (7): 1169-1181 (2007)A secure clustering scheme for geographically routed wireless ad hoc networks., , and . ISSPIT, page 207-212. IEEE Computer Society, (2014)