Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors., , , and . Comput. Electr. Eng., 40 (2): 539-550 (2014)A compatibility strategy for enabling secure and efficient ITS communications in today's Internet., , , , , and . Telecommun. Syst., 63 (2): 243-261 (2016)End to End Secure Data Exchange in Value Chains with Dynamic Policy Updates., , , and . CoRR, (2022)Achieving Low Latency Communications in Smart Industrial Networks with Programmable Data Planes., , , , and . Sensors, 21 (15): 5199 (2021)Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications., , , and . Sensors, 22 (7): 2561 (2022)The cross layer RMPA handover: a reliable mobility pattern aware handover strategy for broadband wireless communication in a high-speed railway domain., , , , and . EURASIP J. Wireless Comm. and Networking, (2012)An Advance Reservation System to Improve Network Resource Utilization in Software-Defined Networks., , , and . IEEE Access, (2020)Expressive Policy-Based Access Control for Resource-Constrained Devices., , , , and . IEEE Access, (2018)A Survey on the Contributions of Software-Defined Networking to Traffic Engineering., , , and . IEEE Commun. Surv. Tutorials, 19 (2): 918-953 (2017)Too Many Options: A Survey of ABE Libraries for Developers., , , and . CoRR, (2022)