Author of the publication

Towards an Advanced PKI-Based Security Solution for Next Generation e-Passport and Associated Applications: The NewP@ss Approach.

, , , and . WICON, volume 146 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 105-112. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensing UMTS Bands Using Cyclostationary Features and Cooperation Between Opportunistic Terminals., , and . CrownCom, page 1-5. IEEE, (2008)Enhanced Localization in Wireless Ad Hoc Networks through Cooperation., , and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 579-589. Springer, (2010)Reference node selection for cooperative positioning using coalition formation games., , and . WPNC, page 105-108. IEEE, (2012)Energy efficiency optimization for downlink OFDMA system in heterogeneous network with QoS constraints., , , , and . Int. J. Commun. Syst., (2017)Towards an Advanced PKI-Based Security Solution for Next Generation e-Passport and Associated Applications: The NewP@ss Approach., , , and . WICON, volume 146 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 105-112. Springer, (2014)Experimental System Level Platform for B3G Scenarios., , , , and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 57-67. Springer, (2010)Location assisted energy efficiency for multi-interfaced mobile terminals., , , and . ICC, page 5660-5664. IEEE, (2012)Location-Based Data Auditing for Precision Farming IoT Networks., , , , , and . CAMAD, page 1-6. IEEE, (2021)A Probabilistic and Highly Efficient Topology Control Algorithm for Underwater Cooperating AUV Networks., , , , , and . Sensors, 17 (5): 1022 (2017)Machine Learning to Automate Network Segregation for Enhanced Security in Industry 4.0., , , , , , and . BROADNETS, volume 263 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 149-158. Springer, (2018)