Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Capossele, Angelo
add a person with the name Capossele, Angelo
 

Other publications of authors with the same name

Securing Underwater Communications: Key Agreement based on Fully Hashed MQV., , , , and . WUWNet, page 12:1-12:5. ACM, (2017)Properties of the Tangle for Uniform Random and Random Walk Tip Selection., , , , and . Blockchain, page 228-236. IEEE, (2019)R-CARP: A Reputation Based Channel Aware Routing Protocol for Underwater Acoustic Sensor Networks., , and . WUWNet, page 37:1-37:6. ACM, (2015)Leveraging Blockchain to Enable Smart-Health Applications., , , , , and . RTSI, page 1-6. IEEE, (2018)Key Management Protocol with Implicit Certificates for IoT systems., , , , and . IoT-Sys@MobiSys, page 37-42. ACM, (2015)Robustness and efficiency of leaderless probabilistic consensus protocols within Byzantine infrastructures., , and . CoRR, (2019)Mind my value: a decentralized infrastructure for fair and trusted IoT data trading., , , , and . IOT, page 15:1-15:8. ACM, (2017)AGREE: exploiting energy harvesting to support data-centric access control in WSNs., , , and . Ad Hoc Networks, 11 (8): 2625-2636 (2013)Security as a CoAP resource: An optimized DTLS implementation for the IoT., , , and . ICC, page 549-554. IEEE, (2015)Toward trusted open data and services., , , and . Internet Technol. Lett., (2019)