Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of 'Attack Trees' Technique to Copyright Protection Protocols Using Watermarking and Definition of a New Transactions Protocol SecDP (Secure Distribution Protocol)., , , , and . MIPS, volume 3311 of Lecture Notes in Computer Science, page 264-275. Springer, (2004)PKIX-based certification infrastructure implementation adapted to non-personal end entities., , and . Future Gener. Comput. Syst., 19 (2): 263-275 (2003)The WiMAX ASN Network in the V2I Scenario., , , and . VTC Fall, page 1-5. IEEE, (2008)Towards Unified Programmability of Cloud and Carrier Infrastructure, , , , , , , , , and 7 other author(s). Third European Workshop on Software Defined Networks, page 6. (2014)Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors., , , and . Comput. Electr. Eng., 40 (2): 539-550 (2014)Improving Early Attack Detection in Networks with sFlow and SDN., , and . WEA (2), volume 916 of Communications in Computer and Information Science, page 323-335. Springer, (2018)The EHU-OEF: An OpenFlow-based Layer-2 experimental facility., , , , and . Comput. Networks, (2014)Performance Enhancement of High-Availability Seamless Redundancy (HSR) Networks Using OpenFlow., , , and . IEEE Commun. Lett., 20 (2): 364-367 (2016)Quantitative measurement of link failure reaction time for devices with P4-programmable data planes., , , , and . Telecommun. Syst., 85 (2): 277-288 (February 2024)Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications., , , and . Sensors, 22 (7): 2561 (2022)