Author of the publication

Security Access Protocols in IoT Capillary Networks.

, , , and . IEEE Internet of Things Journal, 4 (3): 645-657 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BEST-RIM: A mmWave Beam Steering Approach Based on Computer Vision-Enhanced Reconfigurable Intelligent Metasurfaces., , , , , and . IEEE Trans. Veh. Technol., 72 (6): 7613-7626 (June 2023)Enriching videos with automatic place recognition in google maps., , , , and . Multim. Tools Appl., 81 (16): 23105-23121 (2022)Capacity analysis for a power controlled UWB indoor system., and . PIMRC, page 724-728. IEEE, (2004)Promoting Efficient Infrastructure Competition through Vectoring and Enlarged DSL Bandwidth., , and . CoRR, (2016)FttC-Based Fronthaul for 5G Dense/Ultra-Dense Access Network: Performance and Costs in Realistic Scenarios., , and . Future Internet, 9 (4): 71 (2017)An always available control channel for cooperative sensing in cognitive radio networks., , , , and . Wireless Days, page 1-5. IEEE, (2010)Ultra-wideband detect and avoid procedure for WiMAX victims., , and . IET Commun., 3 (2): 268-278 (2009)Multi-Slope Path Loss and Position Estimation With Grid Search and Experimental Results., , , and . IEEE Trans. Signal Inf. Process. over Networks, (2021)Dimensioning of OFDM/OFDMA-Based Cellular Networks Using Exponential Effective SINR., and . IEEE Trans. Vehicular Technology, 58 (8): 4204-4213 (2009)Detect and Avoid Procedure for UWB Interference Mitigation on Narrowband Systems., , , , and . ISWCS, page 428-432. IEEE, (2006)