Author of the publication

Communication and Security in Machine-to-Machine Systems.

, , , , , , and . Wireless Networking for Moving Objects, volume 8611 of Lecture Notes in Computer Science, Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Filtering in Context-Aware Multi-agent System for Machine-to-Machine Communication., , , and . KES-AMSTA, volume 38 of Smart Innovation, Systems and Technologies, page 41-51. Springer, (2015)Communication and Security in Machine-to-Machine Systems., , , , , , and . Wireless Networking for Moving Objects, volume 8611 of Lecture Notes in Computer Science, Springer, (2014)Context-based System for User-Centric Smart Environment., , and . SoftCOM, page 1-5. IEEE, (2020)User privacy risk calculator., , , , , and . SoftCOM, page 211-216. IEEE, (2014)Data rate fluctuations from user perspective in 4G mobile networks., , , , and . SoftCOM, page 180-185. IEEE, (2014)Quality-of-Service in Machine-to-Machine service provisioning process., , , , , and . SoftCOM, page 1-5. IEEE, (2013)Comparison of the CUPUS middleware and MQTT protocol for smart city services., , , and . ConTEL, page 1-8. IEEE, (2015)Energy consumption model for devices in machine-to-machine system., , , , and . ConTEL, page 1-8. IEEE, (2015)Energy-efficient task allocation for service provisioning in machine-to-machine systems., , and . Concurr. Comput. Pract. Exp., (2017)DL-Tags: DLT and Smart Tags for Decentralized, Privacy-Preserving, and Verifiable Supply Chain Management., , and . IEEE Access, (2019)