Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymously accessing JXTA community services through split message forwarding., , and . Math. Comput. Model., 58 (5-6): 1313-1327 (2013)Balancing Power Consumption in IoT Devices by Using Variable Packet Size., , , , , and . CISIS, page 170-176. IEEE Computer Society, (2014)Experimental Evaluation of Anonymous Protocols under the JXTA Middlewar., , and . NBiS, page 52-57. IEEE Computer Society, (2012)VoIP: making secure calls and maintaining high call quality., , , , and . MoMM, page 56-62. ACM, (2010)JXTAnonym: An Anonymity Layer for JXTA Services Messaging., and . IEICE Trans. Inf. Syst., 95-D (1): 169-176 (2012)ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys., , , , , , and . 3PGCIC, page 465-470. IEEE Computer Society, (2010)JXTA Security in Mobile Constrained Devices., , and . AINA Workshops, page 139-144. IEEE Computer Society, (2010)PlanetLab@UOC: A real lab over the Internet to experiment with distributed systems., , , , , and . Comput. Appl. Eng. Educ., 21 (2): 265-275 (2013)An Anonymity Layer for JXTA Services., and . AINA Workshops, page 102-107. IEEE Computer Society, (2011)Bootstrapping smart cities through a self-sustainable model based on big data flows., , , , , and . IEEE Communications Magazine, (2013)