Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Sharing of Partially Homomorphic Encrypted IoT Data., , , , and . SenSys, page 29:1-29:14. ACM, (2017)IEEE 802.15.4 TSCH in Sub-GHz: Design Considerations and Multi-band Support., , , and . LCN, page 42-50. IEEE, (2019)Analysis and Experimental Evaluation of IEEE 802.15.4e TSCH CSMA-CA Algorithm., , , , and . IEEE Trans. Vehicular Technology, 66 (2): 1573-1588 (2017)Efficient Web Requests Scheduling Considering Resources Sharing., and . MASCOTS, page 410-412. IEEE Computer Society, (2010)Poster Abstract: Low-Power Wireless Channel Quality Estimation in the Presence of RF Smog., , and . DCOSS, page 137-138. IEEE Computer Society, (2014)The E-Care@Home Infrastructure for IoT-Enabled Healthcare., , , , , and . HealthyIoT, volume 187 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 138-140. (2016)Poster: Towards Encrypted Query Processing for the Internet of Things., , , , and . MobiCom, page 251-253. ACM, (2015)IETF 6TiSCH: A Tutorial., , , , , and . IEEE Commun. Surv. Tutorials, 22 (1): 595-615 (2020)Towards Formal Verification of Contiki: Analysis of the AES-CCM* Modules with Frama-C., , , , and . EWSN, page 264-269. Junction Publishing, Canada/ ACM, (2018)Towards Blockchain-based Auditable Storage and Sharing of IoT Data., , and . CoRR, (2017)