Author of the publication

Interconnection between 802.15.4 Devices and IPv6: Implications and Existing Approaches

, , , and . (2010)cite arxiv:1002.1146Comment: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Interconnection-between-802.15.4-Devices-and-IPv6-Implications-and-Existing-Approaches.php.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study of Ten Popular Android Mobile VoIP Applications: Are the Communications Encrypted?, , and . HICSS, page 4858-4867. IEEE Computer Society, (2014)Interconnection between 802.15.4 Devices and IPv6: Implications and Existing Approaches, , , and . (2010)cite arxiv:1002.1146Comment: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Interconnection-between-802.15.4-Devices-and-IPv6-Implications-and-Existing-Approaches.php.Implementation and Performance of Threshold Cryptography for Multiple Escrow Agents in VoIP.. SPIT/IPC, volume 62 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 143-150. Springer, (2011)Forensic Taxonomy of Popular Android mHealth Apps., , and . CoRR, (2015)An Android Social App Forensics Adversary Model., , and . HICSS, page 5597-5606. IEEE Computer Society, (2016)