Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Bibliometrics Analysis on 28 years of Authentication and Threat Model Area., , , and . CoRR, (2022)Characteristics and Main Threats about Multi-Factor Authentication: A Survey., , , and . CoRR, (2022)Models of Computing as a Service and IoT: an analysis of the current scenario with applications using LPWAN., , and . CoRR, (2021)A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic., , and . Sensors, 23 (15): 6933 (August 2023)An Experimentation on CoAP Multi Factor Authentication Mechanism with Reputation for Internet of Things Constrained Devices and Low Power Wide Area Network., , , and . ICOIN, page 67-72. IEEE, (2023)DNNET-Ensemble approach to detecting and identifying attacks in IoT environments., , , , and . SBRC, page 435-448. (2023)Advances in Distributed Load Orchestration for Vision Computing in 5G-MEC Environments., , , , , and . ICOIN, page 33-38. IEEE, (2023)Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing., and . CoRR, (2022)