Author of the publication

A survey on road safety and traffic efficiency vehicular applications based on C-V2X technologies.

, , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

INDECT Advanced Security Requirements, , , , and . CoRR, (2010)Effect of content popularity, number of contents and a cellular backup network on the performance of content distribution protocols in urban VANET scenarios., , , and . Comput. Commun., (2017)A Bloom Filter-Based Monitoring Station for a Lawful Interception Platform., , , and . MCSS, volume 429 of Communications in Computer and Information Science, page 214-228. Springer, (2014)Integrated security infrastructures for law enforcement agencies., , , , and . Multim. Tools Appl., 74 (12): 4453-4468 (2015)LWESP: Light-Weight Exterior Sensornet Protocol., , , and . ISCC, page 913-919. IEEE Computer Society, (2009)Experimental Evaluation of the ETSI DCC Adaptive Approach and Related Algorithms., , , and . CoRR, (2024)Buffer Design Under Bursty Traffic with Applications in FCoE Storage Area Networks., , , and . IEEE Communications Letters, 17 (2): 413-416 (2013)Strengths and Weaknesses of the ETSI Adaptive DCC Algorithm: A Proposal for Improvement., , , and . CoRR, (2024)Security architecture for law enforcement agencies., , , and . Multim. Tools Appl., 75 (17): 10709-10732 (2016)Analysis of privacy vulnerabilities in single sign-on mechanisms for multimedia websites., , and . Multim. Tools Appl., 68 (1): 159-176 (2014)