Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pairing-Based Cryptography on the Internet of Things: A Feasibility Study., , , , and . WWIC, volume 10866 of Lecture Notes in Computer Science, page 219-230. Springer, (2018)Load-Aware Scheduling in Local Area Networks Using Clustering., , , , , and . CSCN, page 93. IEEE, (2022)Security analysis of NFC relay attacks using probabilistic model checking., , and . IWCMC, page 524-529. IEEE, (2014)Demo abstract: An experimentation facility enabling flexible network control for the Internet of Things., , , , and . INFOCOM Workshops, page 992-993. IEEE, (2017)Energy-efficiency analysis under QoS constraints using formal methods: A study on EPONs., , and . ICC, page 1-6. IEEE, (2017)OCTAPUS: Empowering Next Generation Central Offices with Cross-Layer Network Intelligence Towards a Reconfigurable Data Plane., , , , , , , , , and 15 other author(s). AIAI Workshops, volume 715 of IFIP Advances in Information and Communication Technology, page 109-123. Springer, (2024)A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks., , , and . Future Gener. Comput. Syst., (2021)Dynamic Topology Discovery Configuration in Software-Defined Vehicular Networks., , , and . CSCN, page 124-130. IEEE, (2022)A Multi-domain Experimentation Environment for 5G Media Verticals., , , and . INFOCOM Workshops, page 461-466. IEEE, (2019)Towards energy consumption evaluation of the SSL handshake protocol in mobile communications., and . WONS, page 135-138. IEEE, (2012)