Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards IoT Orchestrations with Security, Privacy, Dependability and Interoperability Guarantees., , , and . GLOBECOM, page 1-6. IEEE, (2019)Architectural Patterns for Secure IoT Orchestrations., , , , , and . GIoTS, page 1-6. IEEE, (2019)Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources., , , and . IEEE Syst. J., 12 (1): 92-102 (2018)Smart End-to-end Massive IoT Interoperability, Connectivity and Security (SEMIoTICS)., , , , and . ERCIM News, (2019)A review of lightweight block ciphers., , , and . J. Cryptogr. Eng., 8 (2): 141-184 (2018)The Electronic McPhail Trap., , and . Sensors, 14 (12): 22285-22299 (2014)Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of ?Looping Smart Assets?, , , , , , , , and . IEEE Veh. Technol. Mag., 15 (3): 20-31 (2020)PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange., , , , , , , , , and 8 other author(s). CSR, page 538-545. IEEE, (2023)Reactive security for SDN/NFV-enabled industrial networks leveraging service function chaining., , , and . Trans. Emerg. Telecommun. Technol., (2018)Lightweight Cryptography for Embedded Systems - A Comparative Analysis., , , and . DPM/SETOP, volume 8247 of Lecture Notes in Computer Science, page 333-349. Springer, (2013)