Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CONETSI: On Demand Distributed Network State Information Collection using Opportunistic Exploration for Resource Constrained Networks., , , , and . COMSNETS, page 491-498. IEEE, (2020)SATVAM: Toward an IoT Cyber-Infrastructure for Low-Cost Urban Air Quality Monitoring, , , , , , , , , and 2 other author(s). IEEE International Conference on eScience (eScience), page 57--66. (2019)Toward SATVAM: An IoT Network for Air Quality Monitoring., , , , , , , , , and 2 other author(s). CoRR, (2018)Prestige-based peer sampling service: interdisciplinary approach to secure gossip., , , and . SAC, page 1209-1213. ACM, (2009)Floodgate: A Micropayment Incentivized P2P Content Delivery Network., , , and . ICCCN, page 291-297. IEEE, (2008)Effectiveness of TCP SACK, TCP HACK and TCP Trunk over satellite links., , , and . ICC, page 3038-3043. IEEE, (2002)Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions., , and . ICWS, page 615-622. IEEE Computer Society, (2007)Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme., , and . Fundam. Informaticae, 89 (4): 393-417 (2008)A Hybrid PKI-IBC Based Ephemerizer System., , , and . SEC, volume 232 of IFIP, page 241-252. Springer, (2007)Enabling DRM-Preserving Digital Content Redistribution., , , , and . CEC, page 151-158. IEEE Computer Society, (2005)