Author of the publication

Performance evaluation of a SIP-based constrained peer-to-peer overlay.

, , , and . HPCS, page 432-435. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

THORIN: an Efficient Module for Federated Access and Threat Mitigation in Big Stream Cloud Architectures., , , and . IEEE Cloud Comput., 5 (1): 38-48 (2018)Anomaly Detection of Medical IoT Traffic Using Machine Learning., , , , , and . DATA, page 173-182. SCITEPRESS, (2023)Performance evaluation of a SIP-based constrained peer-to-peer overlay., , , and . HPCS, page 432-435. IEEE, (2014)A Scalable and Self-Configuring Architecture for Service Discovery in the Internet of Things., , , , , , and . IEEE Internet Things J., 1 (5): 508-521 (2014)A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord., and . Secur. Commun. Networks, (2018)Roaming Scenarios Based on SIP., and . MMNS, volume 2496 of Lecture Notes in Computer Science, page 302-314. Springer, (2002)mjCoAP: An Open-Source Lightweight Java CoAP Library for Internet of Things Applications., , and . OpenIoT@SoftCOM, volume 9001 of Lecture Notes in Computer Science, page 118-133. Springer, (2014)Byzantine Generals Problem in the Light of P2P Computing., and . MobiQuitous, page 1-5. IEEE Computer Society, (2006)Lightweight multicast forwarding for service discovery in low-power IoT networks., , , , , and . SoftCOM, page 133-138. IEEE, (2014)Wireless LAN-3G Integration: Unified Mechanisms for Secure Authentication based on SIP., , and . ICC, page 2219-2224. IEEE, (2006)