Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trade-Off Between Performance and Energy Consumption in Wireless Sensor Networks., , , , , and . IWSOS, volume 4725 of Lecture Notes in Computer Science, page 264-271. Springer, (2007)XML schema based fault set definition to improve fault injection tools interoperability., , , , , and . Int. J. Crit. Comput. Based Syst., 1 (1/2/3): 220-237 (2010)XML Schema Based Faultset Definition to Improve Faults Injection Tools Interoperability., , , , and . DepCoS-RELCOMEX, page 39-46. IEEE Computer Society, (2008)AAIA: an efficient aggregation scheme against inverting attack for federated learning., , , , , and . Int. J. Inf. Sec., 22 (4): 919-930 (2023)Security Framework for DPWS Compliant Devices., , , , , and . SECURWARE, page 87-92. IEEE Computer Society, (2009)SensoTrust: Trustworthy Domains in Wireless Sensor Networks., , , and . IJDSN, (2015)Design and Implementation of a Java Fault Injector for Exhaustif® SWIFI Tool., , , , , and . DepCoS-RELCOMEX, page 77-83. IEEE Computer Society, (2009)A Lightweight Anonymous Client-Server Authentication Scheme for the Internet of Things Scenario: LAuth., , , and . Sensors, 18 (11): 3695 (2018)QoS in wireless sensor networks: survey and approach., , , , , and . EATIS, page 20. (2007)ASA: advanced secure architecture for preventing unauthorized access in personal computer platforms and BIOS., , , , , and . EATIS, page 18. (2007)