Author of the publication

A Dependable Alternative to the Spanning Tree Protocol.

, , and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 148-164. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physical-layer encryption with stream ciphers., and . ISIT, page 106-110. IEEE, (2008)Citizen Controlled Exchange of Information in e-Government., , and . WEBIST, page 494-499. SciTePress, (2011)Traffic classification for managing Applications' networking profiles., and . Security and Communication Networks, 9 (14): 2557-2575 (2016)Opportunistic Relay Selection for Wireless Cooperative Network., , and . NTMS, page 1-4. IEEE, (2012)Usage of HTTPS by Municipal Websites in Portugal., , , and . WorldCIST (2), volume 931 of Advances in Intelligent Systems and Computing, page 155-164. Springer, (2019)Pseudonymisation with Break-the-Glass Compatibility for Health Records in Federated Services., , and . BIBE, page 274-277. IEEE, (2019)Transparent authentication and confidentiality for stream sockets., and . IEEE Micro, 16 (3): 34-41 (1996)Fast 802.11 handovers with 802.1X reauthentications., , and . Security and Communication Networks, 4 (3): 267-283 (2011)TROPHY: Trustworthy VANET routing with group authentication keys., , and . Ad Hoc Networks, (2018)Decentralized Bootstrap for Social Overlay Networks., and . Communications and Multimedia Security, volume 8735 of Lecture Notes in Computer Science, page 140-143. Springer, (2014)