Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Roaming Scenarios Based on SIP., and . MMNS, volume 2496 of Lecture Notes in Computer Science, page 302-314. Springer, (2002)A Scalable and Self-Configuring Architecture for Service Discovery in the Internet of Things., , , , , , and . IEEE Internet of Things Journal, 1 (5): 508-521 (2014)mjCoAP: An Open-Source Lightweight Java CoAP Library for Internet of Things Applications., , and . OpenIoT@SoftCOM, volume 9001 of Lecture Notes in Computer Science, page 118-133. Springer, (2014)Performance evaluation of a SIP-based constrained peer-to-peer overlay., , , and . HPCS, page 432-435. IEEE, (2014)Byzantine Generals Problem in the Light of P2P Computing., and . MobiQuitous, page 1-5. IEEE Computer Society, (2006)Lightweight multicast forwarding for service discovery in low-power IoT networks., , , , , and . SoftCOM, page 133-138. IEEE, (2014)THORIN: an Efficient Module for Federated Access and Threat Mitigation in Big Stream Cloud Architectures., , , and . IEEE Cloud Comput., 5 (1): 38-48 (2018)A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord., and . Secur. Commun. Networks, (2018)Architecture and testbed implementation of vertical handovers based on SIP session border controllers., , , and . Wireless Personal Communications, 43 (3): 1019-1034 (2007)A session initiation protocol for the Internet of Things., , and . Scalable Computing: Practice and Experience, (2013)