Author of the publication

Performance evaluation of a SIP-based constrained peer-to-peer overlay.

, , , and . HPCS, page 432-435. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord., and . Secur. Commun. Networks, (2018)THORIN: an Efficient Module for Federated Access and Threat Mitigation in Big Stream Cloud Architectures., , , and . IEEE Cloud Comput., 5 (1): 38-48 (2018)A Scalable and Self-Configuring Architecture for Service Discovery in the Internet of Things., , , , , , and . IEEE Internet Things J., 1 (5): 508-521 (2014)Roaming Scenarios Based on SIP., and . MMNS, volume 2496 of Lecture Notes in Computer Science, page 302-314. Springer, (2002)Performance evaluation of a SIP-based constrained peer-to-peer overlay., , , and . HPCS, page 432-435. IEEE, (2014)mjCoAP: An Open-Source Lightweight Java CoAP Library for Internet of Things Applications., , and . OpenIoT@SoftCOM, volume 9001 of Lecture Notes in Computer Science, page 118-133. Springer, (2014)Anomaly Detection of Medical IoT Traffic Using Machine Learning., , , , , and . DATA, page 173-182. SCITEPRESS, (2023)Byzantine Generals Problem in the Light of P2P Computing., and . MobiQuitous, page 1-5. IEEE Computer Society, (2006)Lightweight multicast forwarding for service discovery in low-power IoT networks., , , , , and . SoftCOM, page 133-138. IEEE, (2014)Access control in IPv6-based roaming scenarios., and . ICC, page 913-917. IEEE, (2003)