Author of the publication

A Trustworthy Architecture for Wireless Industrial Sensor Networks: Research Roadmap of EU TWISNet Trust and Security Project.

, , , , , , , , , and . SysSec@DIMVA, page 63-66. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Commodity hardware performance in AES processing., , and . ISPDC, page 82-86. IEEE, (2014)Trust Mechanisms for Multi-owner Wireless Sensor Networks., , , and . CSCS, page 537-542. IEEE, (2013)Performance Comparison of Voice Encryption Algorithms Implemented on Blackfin Platform., , and . ICISSP (Revised Selected Papers), volume 691 of Communications in Computer and Information Science, page 169-191. Springer, (2016)Native Runtime Environment for Internet of Things., , , and . ICCSAMA, volume 358 of Advances in Intelligent Systems and Computing, page 381-390. Springer, (2015)Adaptive Security Framework for Wireless Sensor Networks., , and . INCoS, page 636-641. IEEE, (2012)Real-time DSP Implementations of Voice Encryption Algorithms., , and . ICISSP, page 439-446. SciTePress, (2017)Real time implementation of MELP speech compression algorithm using Blackfin processors., , and . ISPA, page 250-255. IEEE, (2015)Accelerating Encryption Algorithms Using Parallelism., , , and . CSCS, page 549-554. IEEE, (2013)Smart malware detection on Android., , , , , , and . Secur. Commun. Networks, 8 (18): 4254-4272 (2015)SDN-based security mechanism., , , , and . RoEduNet, page 12-17. IEEE, (2015)