Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Apodization Method for Standard Load Modulation Amplitude Measurement on Proximity Integrated Circuit Cards., , and . IEEE Trans. Instrumentation and Measurement, 64 (1): 170-183 (2015)An assessment of the impact of IQ imbalances on the physical layer authentication of IoT wireless devices., , and . GIoTS, page 1-6. IEEE, (2019)Zone Keys Trust Management in Vehicular Networks based on Blockchain., , , and . GIoTS, page 1-6. IEEE, (2019)A Policy-based Framework in Fog enabled Internet of Things for Cooperative ITS., , , , and . GIoTS, page 1-6. IEEE, (2019)An assessment of the impact of wireless interferences on IoT emitter identification using Time Frequency representations and CNN., and . GIoTS, page 1-6. IEEE, (2019)Cyclostationary feature analysis of CEN-DSRC for cognitive vehicular networks., , and . Intelligent Vehicles Symposium, page 214-219. IEEE, (2013)LTE D2D communication for collaborative wearable sensor networks: A connectivity analysis., , and . EuCNC, page 403-407. IEEE, (2016)Security Aspects of Policy Controlled Cognitive Radio., , , and . NTMS, page 1-5. IEEE, (2012)Toward a Blockchain-based Platform to Manage Cybersecurity Certification of IoT devices., , , , and . CSCN, page 1-6. IEEE, (2019)Future of wireless communication: RadioApps and related security and radio computer framework., , , , , , , and . IEEE Wirel. Commun., 19 (4): 9-16 (2012)