Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Proposal for an Internet of Things-based Monitoring System Composed by Low Capability, Open Source and Open Hardware Devices., , , and . SENSORNETS, page 87-94. SciTePress, (2014)Security Framework for DPWS Compliant Devices., , , , , and . SECURWARE, page 87-92. IEEE Computer Society, (2009)Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things., , and . Sensors, 14 (12): 22737-22753 (2014)Security Threats in Network Coding-Enabled Mobile Small Cells., , , , and . BROADNETS, volume 263 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 337-346. Springer, (2018)Integration of wearable devices in a wireless sensor network for an E-health application., , , and . IEEE Wirel. Commun., (2013)AAIA: an efficient aggregation scheme against inverting attack for federated learning., , , , , and . Int. J. Inf. Sec., 22 (4): 919-930 (2023)Game Theory based Joint Task Offloading and Resource Allocation Algorithm for Mobile Edge Computing., , , , and . MSN, page 791-796. IEEE, (2020)Security services provision for telematic services at the knowledge and information society., , , , , , , and . EATIS, page 41. (2007)Intensity normalization of sidescan sonar imagery., , , , , , , , , and . IPTA, page 1-6. IEEE, (2016)Usage of VR Headsets for Rehabilitation Exergames., , , and . IWBBIO (2), volume 10209 of Lecture Notes in Computer Science, page 434-442. (2017)