Author of the publication

Byzantine agreement for reputation management in DHT-based peer-to-peer networks.

, , , and . ICT, page 1-6. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation of a SIP-based constrained peer-to-peer overlay., , , and . HPCS, page 432-435. IEEE, (2014)mjCoAP: An Open-Source Lightweight Java CoAP Library for Internet of Things Applications., , and . OpenIoT@SoftCOM, volume 9001 of Lecture Notes in Computer Science, page 118-133. Springer, (2014)Roaming Scenarios Based on SIP., and . MMNS, volume 2496 of Lecture Notes in Computer Science, page 302-314. Springer, (2002)A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord., and . Secur. Commun. Networks, (2018)A Scalable and Self-Configuring Architecture for Service Discovery in the Internet of Things., , , , , , and . IEEE Internet Things J., 1 (5): 508-521 (2014)THORIN: an Efficient Module for Federated Access and Threat Mitigation in Big Stream Cloud Architectures., , , and . IEEE Cloud Comput., 5 (1): 38-48 (2018)Anomaly Detection of Medical IoT Traffic Using Machine Learning., , , , , and . DATA, page 173-182. SCITEPRESS, (2023)Lightweight multicast forwarding for service discovery in low-power IoT networks., , , , , and . SoftCOM, page 133-138. IEEE, (2014)Byzantine Generals Problem in the Light of P2P Computing., and . MobiQuitous, page 1-5. IEEE Computer Society, (2006)Architecture and testbed implementation of vertical handovers based on SIP session border controllers., , , and . Wireless Personal Communications, 43 (3): 1019-1034 (2007)