Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning from the Past: Implications for the Future Internet and its Management? (Dagstuhl Seminar 11042)., , , and . Dagstuhl Reports, 1 (1): 102-107 (2011)Combining identity federation with Payment: The SAML-based Payment Protocol., and . NOMS, page 495-502. IEEE, (2010)SLO Auditing Task Analysis, Decomposition, and Specification., and . IEEE Trans. Network and Service Management, 8 (1): 15-25 (2011)Design and Evaluation of an SDR-based LoRa Cloud Radio Access Network., , and . WiMob, page 1-7. IEEE, (2020)Design and implementation of an integrated accounting architecture for distributed UMTS and WLAN networks., , and . Int. J. Wirel. Mob. Comput., 2 (4): 275-287 (2007)Editorial for special issue on "challenges and opportunities of Blockchain and Cryptocurrency"., , , and . Int. J. Netw. Manag., (2020)Modeling of P2P-based Video Streaming, and . Joint EC-GIN, EMANICS, and SmoothIT Workshop Economic Traffic Management, Zurich, Switzerland, (August 2008)CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors., , , , and . CoRR, (2022)Sentinel: An Aggregation Function to Secure Decentralized Federated Learning., , , , , and . CoRR, (2023)A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices., , , , , , and . CoRR, (2022)