Author of the publication

Trust management system design for the Internet of Things: A context-aware and multi-service approach.

, , , and . Comput. Secur., (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting Bandwidth Utilization on Network Links Using Machine Learning., , and . CoRR, (2021)(k, n) threshold distributed key exchange for HIP based internet of things., and . MOBIWAC, page 79-86. ACM, (2012)Challenges and Current Results of the TWISNet FP7 Project - (Extended Abstract)., , , , , , , , , and 1 other author(s). TrustBus, volume 7449 of Lecture Notes in Computer Science, page 232-233. Springer, (2012)A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks., , and . IWSOS, volume 8221 of Lecture Notes in Computer Science, page 157-162. Springer, (2013)HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things., and . COMNET, page 1-8. IEEE, (2012)Time Synchronization Attack Scenarios and Analysis of Effective Self-Detection Parameters in a Distributed Industrial Wireless Sensor Network., , , and . PST, page 1-5. IEEE, (2019)Pseudonymous communications in secure industrial wireless sensor networks., , and . PST, page 98-102. IEEE Computer Society, (2013)A Cascade-structured Meta-Specialists Approach for Neural Network-based Intrusion Detection., , , and . CCNC, page 1-6. IEEE, (2019)D-HIP: A distributed key exchange scheme for HIP-based Internet of Things., and . WOWMOM, page 1-7. IEEE Computer Society, (2012)A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications., , , and . J. Netw. Comput. Appl., (2014)