Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation of TCP-BIAD in high-speed, long-distance networks., , , and . Computing, 101 (4): 319-337 (2019)IPsec over IEEE 802.15.4 for low power and lossy networks., , and . MOBIWAC, page 59-64. ACM, (2013)Blended Learning and Open Courseware for Promoting Interoperability in Public Services., , , and . e-Democracy, volume 1111 of Communications in Computer and Information Science, page 79-93. Springer, (2019)Policy-Based Access Control for Body Sensor Networks., , , , and . WISTP, volume 8501 of Lecture Notes in Computer Science, page 150-159. Springer, (2014)Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation., and . IMA Int. Conf., volume 2260 of Lecture Notes in Computer Science, page 268-276. Springer, (2001)An Asymmetric Cryptography Secure Channel Protocol for Smart Cards., and . SEC, volume 147 of IFIP, page 351-366. Kluwer / Springer, (2004)Secure policy-based management solutions in heterogeneous embedded systems networks., , , and . TEMU, page 227-232. IEEE, (2012)Lightweight Cryptography for Embedded Systems - A Comparative Analysis., , , and . DPM/SETOP, volume 8247 of Lecture Notes in Computer Science, page 333-349. Springer, (2013)ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology., , , , , and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 300-313. Springer, (2018)A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem., , , , , and . Security and Communication Networks, (2019)