Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT European Security and Privacy Projects: Integration, Architectures and Interoperability, , , , , , , , , and 53 other author(s). chapter 7, page 237--248. River Publishers, (2018)IoTCrawler: Challenges and Solutions for Searching the Internet of Things, , , , , , , , , and 13 other author(s). Sensors, (2021)Regularity of powers of cover ideals of bipartite graphs., and . Int. J. Algebra Comput., 33 (2): 317-335 (2023)Inpainting GAN-Based Image Blending with Adaptive Binary Line Mask., , , , , and . J. Multim. Inf. Syst., 10 (3): 227-236 (September 2023)A Separated Receptor/Transducer Scheme as Strategy to Enhance the Gas Sensing Performance Using Hematite-Carbon Nanotube Composite., , , , , , , and . Sensors, 19 (18): 3915 (2019)Proximity Verification Based on Acoustic Room Impulse Response., , , , and . CoRR, (2018)A Log Auditing Approach for Trust Management in Peer-to-Peer Collaboration, and . CoRR, (2010)Auditable Asymmetric Password Authenticated Public Key Establishment., , , and . IACR Cryptol. ePrint Arch., (2020)Measure of bullwhip effect in supply chain with price-sensitive and correlated demand., , and . Comput. Ind. Eng., (2019)Log Auditing for Trust Assessment in Peer-to-Peer Collaboration., and . ISPDC, page 207-214. IEEE Computer Society, (2011)