Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Host Identity Protocol Location Privacy Extensions, , , , and . Internet-Draft draft-matos-hip-privacy-extensions-01.txt, (March 2006)Work In Progress.A New Perspective on Mobility Management Scenarios and Approaches., , , , and . MONAMI, volume 68 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 340-353. Springer, (2010)User Centric Community Clouds., , and . Wirel. Pers. Commun., 58 (1): 31-48 (2011)Deploying and testing a NGN testbed IST-daidalos testbed., , , and . TRIDENTCOM, page 1-6. IEEE Computer Society, (2009)Secure hotspot authentication through a Near Field Communication side-channel., , and . WiMob, page 807-814. IEEE Computer Society, (2012)Preserving Privacy in Mobile Environments With Virtual Network Stacks., , , and . GLOBECOM, page 1971-1976. IEEE, (2007)Preparing FLOSS for Future Network Paradigms: A Survey on Linux Network Management., , and . OSS, volume 365 of IFIP Advances in Information and Communication Technology, page 75-89. Springer, (2011)Virtual Identity Framework for Telecom Infrastructures., , , and . Wirel. Pers. Commun., 45 (4): 521-543 (2008)Virtual network stacks: from theory to practice., , , and . Secur. Commun. Networks, 5 (7): 738-751 (2012)Hint-driven DNS resolution., , and . ISCC, page 912-915. IEEE Computer Society, (2011)