Author of the publication

Πλαίσιο διαχείρισης κατανεμημένων συστημάτων και υπηρεσιών βασισμένο σε τεχνολογίες ιστού: εφαρμογή στη περίπτωση των δικτύων διανομής περιεχομένου

. Athens University Economics and Business, Greece, (2000)National Archive of PhD Theses: oai:10442/17655.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing cyber security risks in industrial control systems with game theory and viable system modelling., , , , and . SoSE, page 266-271. IEEE, (2014)A pilot study on the security of pattern screen-lock methods and soft side channel attacks., , , and . WISEC, page 1-6. ACM, (2013)An emulator for the network stack of Integrated Modular Systems., , , and . SoSE, page 1-6. IEEE, (2010)Digital investigations for IPv6-based Wireless Sensor Networks., , , , and . Digit. Investig., 11 (Supplement 2): S66-S75 (2014)Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks., , and . WISTP, volume 7886 of Lecture Notes in Computer Science, page 34-49. Springer, (2013)Microsecond-Accuracy Time Synchronization Using the IEEE 802.15.4 TSCH Protocol., , , , , and . LCN Workshops, page 156-164. IEEE Computer Society, (2016)ADDER: Probabilistic, Application Layer Service Discovery for MANETs and Hybrid Wired-Wireless Networks., , , and . CNSR, page 33-40. IEEE Computer Society, (2011)Experiences from porting the Contiki operating system to a popular hardware platform., and . DCOSS, page 1-6. IEEE Computer Society, (2011)Πλαίσιο διαχείρισης κατανεμημένων συστημάτων και υπηρεσιών βασισμένο σε τεχνολογίες ιστού: εφαρμογή στη περίπτωση των δικτύων διανομής περιεχομένου. Athens University Economics and Business, Greece, (2000)National Archive of PhD Theses: oai:10442/17655.Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method., , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 115-126. Springer, (2014)