Author of the publication

Anonymous Networking Meets Real-World Business Requirements.

, , and . TrustCom, page 451-457. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Denial-of-Service detection in 6LoWPAN based Internet of Things., , , and . WiMob, page 600-607. IEEE Computer Society, (2013)A Field Experiment on Gamification of Code Quality in Agile Development., , and . PPIG, page 17. Psychology of Programming Interest Group, (2012)Towards requirements for trust management.. PST, page 159-160. IEEE Computer Society, (2012)Anonymous Networking Meets Real-World Business Requirements., , and . TrustCom, page 451-457. IEEE Computer Society, (2012)