Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Harnessing cross-layer-design., , , , and . Ad Hoc Networks, (2014)IP-QoS: Scalable and Flexible Quality-of-Service with Differentiated Services.. The Industrial Information Technology Handbook, CRC Press, (2005)A Trust Point-based Security Architecture for Sensor Data in the Cloud., , , and . Trusted Cloud Computing, Springer, (2014)SCSlib: Transparently Accessing Protected Sensor Data in the Cloud., , , and . EUSPN/ICTH, volume 37 of Procedia Computer Science, page 370-375. Elsevier, (2014)Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor Networks., , , and . ICC, page 1-6. IEEE, (2010)Reliability of data in structured peer-to-peer systems., , , , and . HOT-P2P, page 108-113. IEEE Computer Society, (2004)A blueprint for switching between secure routing protocols in wireless multihop networks., , , , and . WOWMOM, page 1-6. IEEE Computer Society, (2013)A receiver-based 802.11 rate adaptation scheme with On-Demand Feedback., , , , and . PIMRC, page 399-405. IEEE, (2012)Cooperative security in distributed networks., , , and . Computer Communications, 36 (12): 1284-1297 (2013)Improving the Performance of TCP on Guaranteed Bandwidth Connections., , and . Kommunikation in Verteilten Systemen, page 173-184. Springer, (2001)