Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communication and Security in Machine-to-Machine Systems., , , , , , and . Wireless Networking for Moving Objects, volume 8611 of Lecture Notes in Computer Science, Springer, (2014)Data Filtering in Context-Aware Multi-agent System for Machine-to-Machine Communication., , , and . KES-AMSTA, volume 38 of Smart Innovation, Systems and Technologies, page 41-51. Springer, (2015)Context-based System for User-Centric Smart Environment., , and . SoftCOM, page 1-5. IEEE, (2020)Energy consumption model for devices in machine-to-machine system., , , , and . ConTEL, page 1-8. IEEE, (2015)Comparison of the CUPUS middleware and MQTT protocol for smart city services., , , and . ConTEL, page 1-8. IEEE, (2015)Microservices as Agents in IoT Systems., , , and . KES-AMSTA, volume 74 of Smart Innovation, Systems and Technologies, page 22-31. Springer, (2017)DL-Tags: DLT and Smart Tags for Decentralized, Privacy-Preserving, and Verifiable Supply Chain Management., , and . IEEE Access, (2019)User privacy risk calculator., , , , , and . SoftCOM, page 211-216. IEEE, (2014)Data rate fluctuations from user perspective in 4G mobile networks., , , , and . SoftCOM, page 180-185. IEEE, (2014)Quality-of-Service in Machine-to-Machine service provisioning process., , , , , and . SoftCOM, page 1-5. IEEE, (2013)