Author of the publication

A deep analysis on future web technologies and protocols over broadband GEO satellite networks.

, , , , , , , , , , , , and . Int. J. Satellite Communications Networking, 33 (5): 451-472 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimization of a peer-to-peer system for efficient content replication., and . European Journal of Operational Research, 196 (2): 423-433 (2009)Recent Advancements in Digital Forensics., , and . IEEE Security & Privacy, 15 (6): 10-11 (2017)Exploiting IP telephony with silence suppression for hidden data transfers., , , , and . Computers & Security, (2018)Supporting Vertical Handover by Using a Pastry Peer-to-Peer Overlay Network., , , , and . PerCom Workshops, page 163-167. IEEE Computer Society, (2006)IPv6 Covert Channels in the Wild., , and . CECC, page 10:1-10:6. ACM, (2019)Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges., , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (4): 1-3 (2021)The energy impact of security mechanisms in modern mobile devices., and . Netw. Secur., 2012 (2): 11-14 (2012)Design of a peer-to-peer system for optimized content replication., and . Computer Communications, 30 (16): 3107-3116 (2007)Analysis of Human Awareness of Security and Privacy Threats in Smart Environments., , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 165-177. Springer, (2015)Steganography in Modern Smartphones and Mitigation Techniques., and . IEEE Communications Surveys and Tutorials, 17 (1): 334-357 (2015)