Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Controller selection in a Wireless Mesh SDN under network partitioning and merging scenarios., , , , , and . CoRR, (2014)Multipath forwarding strategies in Information Centric Networks with AIMD congestion control., , and . CoRR, (2014)On the practical applicability of SDN research., , , , and . NOMS, page 1-9. IEEE, (2016)Scholarium: Supporting Identity Claims Through a Permissioned Blockchain., , , and . RTSI, page 1-6. IEEE, (2018)Wireless Mesh Software Defined Networks (wmSDN)., , , and . WiMob, page 89-95. IEEE Computer Society, (2013)FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication., , , , and . ARES, page 715-724. IEEE Computer Society, (2016)Intermodule data sharing for flexible wireless MAC., , , , and . SoftCOM, page 1-6. IEEE, (2013)Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication., , , , , , , , , and 2 other author(s). IEEE Trans. Inf. Forensics Secur., (2020)Performance evaluation and tuning of Virtual Infrastructure Managers for (Micro) Virtual Network Functions., , , , , , and . NFV-SDN, page 141-147. IEEE, (2016)On the feasibility of attribute-based encryption for WLAN access control., , , , and . WiMob, page 1-8. IEEE Computer Society, (2017)