Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power consumption in remote gaming: An empirical evaluation., , , , and . INFOCOM Workshops, page 736-741. IEEE, (2016)Using the Host Identity Protocol with Legacy Applications., , and . RFC, (September 2008)Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles., , and . NordSec, volume 7127 of Lecture Notes in Computer Science, page 33-48. Springer, (2010)Host Identity Protocol Architecture., and . RFC, (July 2021)Device group management in constrained networks., , , and . PerCom Workshops, page 1-6. IEEE Computer Society, (2016)Hypervisors vs. Lightweight Virtualization: A Performance Comparison., , and . IC2E, page 386-393. IEEE Computer Society, (2015)Secure Cloud Connectivity for Scientific Applications., , , , , , , , and . IEEE Trans. Serv. Comput., 11 (4): 658-670 (2018)Basic Socket Interface Extensions for the Host Identity Protocol (HIP)., and . RFC, (July 2011)Anatomy of the connecting architecture of Internet of Things., , , , and . CCIS, page 1230-1234. IEEE, (2012)Benchmarking Q-Learning Methods for Intelligent Network Orchestration in the Edge., , , , , , , , , and . 6G SUMMIT, page 1-5. IEEE, (2020)