Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Burnable Pseudo-Identity: A Non-Binding Anonymous Identity Method for Ethereum., , , , and . IEEE Access, (2021)Easing the Mobility of Disabled People in Supermarkets Using a Distributed Solution., , , , , and . IWAAL, volume 6693 of Lecture Notes in Computer Science, page 41-48. Springer, (2011)Enabling User Access Control in Energy-constrained Wireless Smart Environments., , , , and . J. Univers. Comput. Sci., 19 (17): 2490-2505 (2013)RESTful triple spaces of things., , and . WoT, page 5. ACM, (2012)Energy-aware architecture for information search in the semantic web of things., , and . Int. J. Web Grid Serv., 10 (2/3): 192-217 (2014)Distributed Tracking System for Patients with Cognitive Impairments., , , , , and . IWAAL, volume 6693 of Lecture Notes in Computer Science, page 49-56. Springer, (2011)Lightweight User Access Control in Energy-Constrained Wireless Network Services., , , , and . UCAmI, volume 7656 of Lecture Notes in Computer Science, page 33-41. Springer, (2012)Extending a User Access Control Proposal for Wireless Network Services with Hierarchical User Credentials., , , , and . SOCO-CISIS-ICEUTE, volume 239 of Advances in Intelligent Systems and Computing, page 601-610. Springer, (2013)PT Anywhere: a mobile environment for practical learning of network engineering., , , and . Interact. Learn. Environ., 28 (4): 482-496 (2020)Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services., , , , , and . Log. J. IGPL, 24 (1): 80-91 (2016)