Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Twin Development: Mathematical Modeling., , , and . ICPS, page 1-8. IEEE, (2023)Radio Resource Sharing in 6G Private Networks: Trustworthy Spectrum Allocation for Coexistence through DLT as Core Function., , , and . 6GNet, page 1-8. IEEE, (2022)Deterministic Planning for Flexible Intralogistics., , , and . ICAC, page 1-6. IEEE, (2021)Securing Industrial Wireless Networks: Enhancing SDN with PhySec., , and . NextComp, page 1-7. IEEE, (2019)Trust-Awareness to Secure Swarm Intelligence from Data Injection Attack., , , and . CoRR, (2022)Status-preserving, Seamless Relocation of Processes in Orchestrated Networks such as Organic 6G., and . ICPS, page 1-8. IEEE, (2022)DLT architectures for trust anchors in 6G., , , and . Ann. des Télécommunications, 78 (9-10): 551-560 (October 2023)The Road to Trustworthy 6G: A Survey on Trust Anchor Technologies., , and . IEEE Open J. Commun. Soc., (2023)Proof of Concept for IoT Device Authentication Based on SRAM PUFs Using ATMEGA 2560-MCU., , , , and . ICDIS, page 36-42. IEEE, (2018)Analysis of 5G Channel Access for Collaboration with TSN Concluding at a 5G Scheduling Mechanism., , , and . Network, 2 (3): 440-455 (2022)