Author of the publication

Analytical efficiency evaluation of a network mobility management protocol for Intelligent Transportation Systems.

, , , , and . EURASIP J. Wirel. Commun. Netw., (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SCADA Systems in the Railway Domain: Enhancing Reliability through Redundant MultipathTCP., , , and . ITSC, page 2305-2310. IEEE, (2015)A lossy channel aware parameterisation of a novel security protocol for wireless IP-enabled sensors., , , , and . Wirel. Networks, 21 (4): 1289-1308 (2015)A high performance link layer mobility management strategy for professional private broadband networks., , , and . J. Netw. Comput. Appl., 36 (4): 1152-1163 (2013)A Framework for Vulnerability Detection in European Train Control Railway Communications., , , and . Secur. Commun. Networks, (2018)A Contribution to Safe Railway Operation: Evaluating the Effect of Electromagnetic Disturbances on Balise-to-BTM Communication in Railway Control Signaling Systems., , , , , and . IEEE Veh. Technol. Mag., 16 (2): 104-112 (2021)WiMax on Rails., , , , and . IEEE Veh. Technol. Mag., 3 (3): 47-56 (2008)Next-Generation SDN and Fog Computing: A New Paradigm for SDN-Based Edge Computing., , , and . Fog-IoT, volume 80 of OASIcs, page 9:1-9:8. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Leveraging Semantic Technologies for Digital Interoperability in the European Railway Domain., , , , , , and . ISWC, volume 12922 of Lecture Notes in Computer Science, page 648-664. Springer, (2021)Cyber security analysis of the European train control system., and . IEEE Communications Magazine, 53 (10): 110-116 (2015)Design and formal security evaluation of NeMHIP: A new secure and efficient network mobility management protocol based on the Host Identity Protocol., , , , and . Comput. Secur., (2013)