Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors., , , and . Comput. Electr. Eng., 40 (2): 539-550 (2014)End to End Secure Data Exchange in Value Chains with Dynamic Policy Updates., , , and . CoRR, (2022)A compatibility strategy for enabling secure and efficient ITS communications in today's Internet., , , , , and . Telecommun. Syst., 63 (2): 243-261 (2016)Achieving Low Latency Communications in Smart Industrial Networks with Programmable Data Planes., , , , and . Sensors, 21 (15): 5199 (2021)Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications., , , and . Sensors, 22 (7): 2561 (2022)The cross layer RMPA handover: a reliable mobility pattern aware handover strategy for broadband wireless communication in a high-speed railway domain., , , , and . EURASIP J. Wireless Comm. and Networking, (2012)An Advance Reservation System to Improve Network Resource Utilization in Software-Defined Networks., , , and . IEEE Access, (2020)Expressive Policy-Based Access Control for Resource-Constrained Devices., , , , and . IEEE Access, (2018)A Survey on the Contributions of Software-Defined Networking to Traffic Engineering., , , and . IEEE Commun. Surv. Tutorials, 19 (2): 918-953 (2017)Multi-Layer Monitoring at the Edge for Vehicular Video Streaming: Field Trials., , , , , and . BMSB, page 1-7. IEEE, (2023)