Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Handover Key Management schemes under IETF perspective., , , and . Comput. Stand. Interfaces, 32 (5-6): 266-273 (2010)SDN-based automated rekey of IPsec security associations: Design and practical validations., , , , and . Comput. Networks, (September 2023)Deployment of vehicular networks in highways using 802.11p and IPv6 technologies., , and . Int. J. Ad Hoc Ubiquitous Comput., 24 (1/2): 33-48 (2017)A network access control solution based on PANA for intelligent transportation systems., , , and . ICCVE, page 444-449. IEEE, (2014)KAMU: providing advanced user privacy in Kerberos multi-domain scenarios., , , , , and . Int. J. Inf. Sec., 12 (6): 505-525 (2013)High-Throughput Infrastructure for Advanced ITS Services: A Case Study on Air Pollution Monitoring., , , , , and . IEEE Trans. Intell. Transp. Syst., 19 (7): 2246-2257 (2018)A Framework for Dynamic Configuration of TLS Connections Based on Standards., , , , and . J. Netw. Syst. Manag., 30 (2): 24 (2022)Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations., , , and . Comput. Stand. Interfaces, 33 (5): 494-504 (2011)Comprehensive Vehicular Networking Platform for V2I and V2V Communications within the Walkie-Talkie Project., , , , , and . Int. J. Distributed Sens. Networks, (2013)Support of Fragmentation of RADIUS Packets., , , , , and . RFC, (April 2015)