Author of the publication

Towards IoT Orchestrations with Security, Privacy, Dependability and Interoperability Guarantees.

, , , and . GLOBECOM, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards IoT Orchestrations with Security, Privacy, Dependability and Interoperability Guarantees., , , and . GLOBECOM, page 1-6. IEEE, (2019)Architectural Patterns for Secure IoT Orchestrations., , , , , and . GIoTS, page 1-6. IEEE, (2019)Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources., , , and . IEEE Syst. J., 12 (1): 92-102 (2018)A review of lightweight block ciphers., , , and . J. Cryptogr. Eng., 8 (2): 141-184 (2018)Smart End-to-end Massive IoT Interoperability, Connectivity and Security (SEMIoTICS)., , , , and . ERCIM News, (2019)PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange., , , , , , , , , and 8 other author(s). CSR, page 538-545. IEEE, (2023)The Electronic McPhail Trap., , and . Sensors, 14 (12): 22285-22299 (2014)Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of ?Looping Smart Assets?, , , , , , , , and . IEEE Veh. Technol. Mag., 15 (3): 20-31 (2020)DSAPE - Dynamic Security Awareness Program Evaluation., , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 258-269. Springer, (2014)Secure and Authenticated Access to LLN Resources Through Policy Constraints., , , and . WISTP, volume 9311 of Lecture Notes in Computer Science, page 271-280. Springer, (2015)