Author of the publication

In Search of an Internet of Things Service Architecture: REST or WS-*? A Developers' Perspective.

, , and . MobiQuitous, volume 104 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 326-337. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ion, Iulia
add a person with the name Ion, Iulia
 

Other publications of authors with the same name

"...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices., , and . SOUPS, page 327-346. USENIX Association, (2015)"My religious aunt asked why i was trying to sell her viagra": experiences with account hijacking., , , and . CHI, page 2657-2666. ACM, (2014)Web Services and Data Caching for Java Mobile Clients., , and . BTW Studierendenprogramm, page 10-12. International University, Bruchsal, Germany, (2007)Expert and Non-Expert Attitudes towards (Secure) Instant Messaging., , , , and . SOUPS, page 147-157. USENIX Association, (2016)Towards Java-based Data Caching for Mobile Information System Clients., , , and . MMS, volume P-104 of LNI, page 97-101. GI, (2007)MTrainSchedule: Combining Web Services and Data Caching on Mobile Devices., , and . Datenbank-Spektrum, 7 (21): 51-53 (2007)UACAP: A Unified Auxiliary Channel Authentication Protocol., , and . IEEE Trans. Mob. Comput., 12 (4): 710-721 (2013)Resource Management for Global Public Computing: Many Policies Are Better Than (N)one., , and . WORLDS, USENIX Association, (2006)In Search of an Internet of Things Service Architecture: REST or WS-*? A Developers' Perspective., , and . MobiQuitous, volume 104 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 326-337. Springer, (2011)For some eyes only: protecting online information sharing., , , , and . CODASPY, page 1-12. ACM, (2013)