Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kikiras, Panayotis
add a person with the name Kikiras, Panayotis
 

Other publications of authors with the same name

A Tool for Calculating Energy Consumption in Wireless Sensor Networks., , , and . Panhellenic Conference on Informatics, volume 3746 of Lecture Notes in Computer Science, page 611-621. Springer, (2005)Üser Authentication Method and Implementation Using a Three-Axis Accelerometer"., , , and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 192-202. Springer, (2010)Enabling the usage of sensor networks with service-oriented architectures., , , , , , , , and . MidSens, page 1. ACM, (2012)Wireless Sensor Networks: Business Models and Market Issues., , , and . CTTE, page 1-5. IEEE, (2007)A honeypot-driven cyber incident monitor: lessons learned and steps ahead., , , and . SIN, page 158-164. ACM, (2015)Components of fog computing in an industrial internet of things context., , , , , and . SECON Workshops, page 37-42. IEEE, (2015)End-2-End privacy architecture for IoT., , , , and . CNS, page 705-706. IEEE, (2015)A view on privacy & trust in IoT., , and . ICC Workshops, page 2665-2670. IEEE, (2015)Cooperative communication in channel assignment strategies for IEEE 802.11k WLAN systems., , , , , , and . PIMRC, page 1924-1929. IEEE, (2013)Semantically enriched navigation for indoor environments., , , and . IJWGS, 2 (4): 453-478 (2006)