Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the DTLS Protocol from CoAP in Fog-to-Fog Communications., , and . SOSE, IEEE, (2019)The importance of a standard securit y archit ecture for SOA-based iot middleware., , , and . IEEE Communications Magazine, 53 (12): 20-26 (2015)A hypervisor approach with real-time support to the MIPS M5150 processor., , and . ISQED, page 495-501. IEEE, (2015)Full-Virtualization on MIPS-based MPSOCs embedded platforms with real-time support., , and . SBCCI, page 44:1-44:7. ACM, (2014)Lightweight Security Architecture Based on Embedded Virtualization and Trust Mechanisms for IoT Edge Devices., , , , , , and . IEEE Commun. Mag., 57 (2): 67-73 (2019)MIPS and RISC-V: Evaluating Virtualization Trade-off for Edge Devices., , , , , and . WF-IoT, page 1-6. IEEE, (2022)Context-Aware Security in the Internet of Things: A Review., , , and . AINA (3), volume 655 of Lecture Notes in Networks and Systems, page 518-531. Springer, (2023)Providing Context-Aware Security for IoT Environments Through Context Sharing Feature., , , and . TrustCom/BigDataSE, page 1711-1715. IEEE, (2018)Context-based search engine for industrial IoT: Discovery, search, selection, and usage of devices., , , , , and . ETFA, page 1-8. IEEE, (2015)Automating the enterprise business processes in a supply chain environment through RFID services based on CEP technology., , , and . ETFA, page 1-4. IEEE, (2010)