Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building Trust in the Human?Internet of Things Relationship., , , , , and . IEEE Technol. Soc. Mag., 33 (4): 73-80 (2014)Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy., , , and . GIoTS, page 1-6. IEEE, (2017)Policy-Based Management of Grids and Networks Through an Hierarchical Architecture., , , , and . SAPIR, volume 3126 of Lecture Notes in Computer Science, page 42-54. Springer, (2004)Security certification and labelling in Internet of Things., , , , , and . WF-IoT, page 627-632. IEEE Computer Society, (2016)A Model-Based Security Toolkit for the Internet of Things., , , , , and . ARES, page 78-87. IEEE Computer Society, (2014)A Framework for Privacy Protection and Usage Control of Personal Data in a Smart City Scenario., , , and . CRITIS, volume 8328 of Lecture Notes in Computer Science, page 212-217. Springer, (2013)SecKit: A Model-based Security Toolkit for the Internet of Things., , , and . Computers & Security, (2015)A novel multi-hop secure LTE-D2D communication protocol for IoT scenarios., , , , and . ICT, page 1-6. IEEE, (2016)A Blockchain-based Approach for Data Accountability and Provenance Tracking., , and . ARES, page 14:1-14:10. ACM, (2017)Trust management in pervasive and service-oriented architectures.. HPCS, page 255. IEEE, (2009)