Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Mechanisms for Wireless Sensor Networks.. SENSORNETS, page IS-13. SciTePress, (2014)Low-Power Radio Communication in Industrial Outdoor Deployments: The Impact of Weather Conditions and ATEX-Compliance., , , , and . SENSAPPEAL, volume 29 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 159-176. Springer, (2009)Codo: confidential data storage for wireless sensor networks., , , , and . MASS Workshops, page 1-6. IEEE Computer Society, (2012)978-1-4673-2433-5.An Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems., , , and . PerCom Workshops, page 267-271. IEEE Computer Society, (2007)Introduction from Session Chair - Multimedia and Telecommunications Track Session: Content Caching.. EUROMICRO, page 232. IEEE Computer Society, (2003)Reliability comparison of transmit/receive diversity and error control coding in low-power medium access control protocols., , , and . IET Networks, 3 (4): 284-292 (2014)Fusion: coalesced confidential storage and communication framework for the IoT., , , and . Security and Communication Networks, 9 (15): 2656-2673 (2016)Differentiating Clear Channel Assessment Using Transmit Power Variation., and . TOSN, 14 (2): 15:1-15:28 (2018)Combining Positioning and Communication Using UWB Transceivers., , and . DCOSS, volume 5516 of Lecture Notes in Computer Science, page 329-342. Springer, (2009)A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks., , and . IEEE Communications Surveys and Tutorials, 14 (2): 240-264 (2012)