Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Entropy harvesting from physical sensors., , and . WISEC, page 149-154. ACM, (2013)Ephemeral: Lightweight pseudonyms for 6LoWPAN MAC addresses., , , and . PIMRC, page 1-6. IEEE, (2016)A first Step towards a Protection Profile for the Security Evaluation of Consensus Mechanisms.. IoTSMS, page 1-6. IEEE, (2020)HistoTrust: Ethereum-Based Attestation of a Data History Built with OP-TEE and TPM., , , , , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 130-145. Springer, (2021)Practices for Assessing the Security Level of Solidity Smart Contracts., and . FPS (1), volume 14551 of Lecture Notes in Computer Science, page 71-86. Springer, (2023)The entropy of wireless statistics., , and . EuCNC, page 1-5. IEEE, (2014)A hierarchical approach for scene segmentation based on 2D motion., , and . ICPR, page 218-222. IEEE Computer Society, (1996)Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis., and . IEEE Internet of Things Journal, 1 (5): 384-398 (2014)A Framework of Deployment Strategy for Hierarchical WSN Security Management., and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 310-318. Springer, (2011)Preserving privacy in secured ZigBee wireless sensor networks., , and . WF-IoT, page 715-720. IEEE Computer Society, (2015)