Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Harnessing cross-layer-design., , , , and . Ad Hoc Networks, (2014)IP-QoS: Scalable and Flexible Quality-of-Service with Differentiated Services.. The Industrial Information Technology Handbook, CRC Press, (2005)A Trust Point-based Security Architecture for Sensor Data in the Cloud., , , and . Trusted Cloud Computing, Springer, (2014)Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor Networks., , , and . ICC, page 1-6. IEEE, (2010)SCSlib: Transparently Accessing Protected Sensor Data in the Cloud., , , and . EUSPN/ICTH, volume 37 of Procedia Computer Science, page 370-375. Elsevier, (2014)A blueprint for switching between secure routing protocols in wireless multihop networks., , , , and . WOWMOM, page 1-6. IEEE Computer Society, (2013)A receiver-based 802.11 rate adaptation scheme with On-Demand Feedback., , , , and . PIMRC, page 399-405. IEEE, (2012)Reliability of data in structured peer-to-peer systems., , , , and . HOT-P2P, page 108-113. IEEE Computer Society, (2004)Cooperative security in distributed networks., , , and . Computer Communications, 36 (12): 1284-1297 (2013)WiSec 2011 demo: PISA-SA - security and mobility in a collaborative muni-fi., , , , and . Mobile Computing and Communications Review, 15 (3): 35-36 (2011)