Author of the publication

A configurable medium access control protocol for IEEE 802.15.4 networks.

, , and . ICUMT, page 301-308. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unity is strength!: combining attestation and measurements inspection to handle malicious data injections in WSNs., , and . WISEC, page 134-144. ACM, (2017)A Hybrid Threat Model for Smart Systems., , , and . IEEE Trans. Dependable Secur. Comput., 20 (5): 4403-4417 (September 2023)A Trustful Infrastructure for the Internet of Things Based on EPOSMote., , and . DASC, page 63-68. IEEE Computer Society, (2011)Towards more practical software-based attestation., and . Comput. Networks, (2019)A cross-layer approach to trustfulness in the Internet of Things., , , , and . ISORC, page 1-8. IEEE Computer Society, (2013)Improvements in Wireless Communication and Support for WMSN in IEEE 1451., , , and . SBESC, page 109-114. IEEE Computer Society, (2014)Attestation in Wireless Sensor Networks: A Survey., and . ACM Comput. Surv., 49 (3): 51:1-51:31 (2016)A configurable medium access control protocol for IEEE 802.15.4 networks., , and . ICUMT, page 301-308. IEEE, (2010)Monitoring the health and integrity of Wireless Sensor Networks.. Imperial College London, UK, (2019)British Library, EThOS.Performance evaluation of receiver based MAC using configurable framework in WSNs., , , and . WCNC, page 878-883. IEEE, (2013)