Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integration of the OAuth and Web Service family security standards., , , and . Comput. Networks, 57 (10): 2233-2249 (2013)Standards News., , , , , , , , , and 6 other author(s). IEEE Commun. Stand. Mag., 2 (1): 12-18 (2018)The NFVRG Network Function Virtualization Research at the IRTF., and . J. ICT Stand., 3 (1): 57-66 (2015)Small-Packet Flows in Software Defined Networks: Traffic Profile Optimization., , , , , , , , and . J. Networks, 10 (4): 176-187 (2015)Scalable topological forwarding and routing policies in RINA-enabled programmable data centers., , , , , and . Trans. Emerg. Telecommun. Technol., (2017)Network Digital Twin: Context, Enabling Technologies and Opportunities., , , , , , , , , and 6 other author(s). CoRR, (2022)TACAR: a Simple and Fast Way for Building Trust among PKIs., , and . EuroPKI, volume 3093 of Lecture Notes in Computer Science, page 173-179. Springer, (2004)SCoT: A secure content-oriented transport., , , , and . J. Netw. Comput. Appl., (2018)Network Slicing for 5G with SDN/NFV: Concepts, Architectures and Challenges., , , , , and . CoRR, (2017)Intent Classification., , , , , and . RFC, (October 2022)