Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smartphone assisted security pairings for the Internet of Things.. VITAE, page 1-5. IEEE, (2014)Security-driven prioritization for tactical mobile networks., , , , and . J. Inf. Secur. Appl., (2022)Critical Communications Over Mobile Operators' Networks: 5G Use Cases Enabled by Licensed Spectrum Sharing, Network Slicing and QoS Control., , , , , , , , , and 3 other author(s). IEEE Access, (2018)A Security Analysis of a P2P Incentive Mechanisms for Mobile Devices., , and . ICIW, page 397-402. IEEE Computer Society, (2008)OpenHouse: A Secure Platform for Distributed Home Services., , , and . PST, page 15-23. IEEE Computer Society, (2008)Field trial with tactical bubbles for mission critical communications., , , , , , , and . Trans. Emerg. Telecommun. Technol., (2022)Security Awareness in Software-Defined Multi-Domain 5G Networks., , , , and . Future Internet, 10 (3): 27 (2018)An Overview of the Security Landscape of Virtual Mobile Networks., , , , , , and . IEEE Access, (2021)A Security Architecture for 5G Networks., , , , , , , , , and 5 other author(s). IEEE Access, (2018)Micro-Segmenting 5G., , , , , and . IoTBDS, page 17-28. SciTePress, (2018)