Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Adaptable Framework for Interoperating Between Wireless Sensor Networks and External Applications., , , and . SENSORNETS, page 95-102. SciTePress, (2014)Enabling Network-Layer Security on IPv6 Wireless Sensor Networks., , and . GLOBECOM, page 1-6. IEEE, (2010)The Cost of Using IEEE 802.16d Dynamic Channel Configuration., , , , , , , , and . ICC, page 383-390. IEEE, (2008)Exploring network mobility in IPv6 environments: issues and lessons learnt., , , , and . SMC (5), page 4606-4611. IEEE, (2004)On the feasibility of secure application-layer communications on the Web of Things., , and . LCN, page 228-231. IEEE Computer Society, (2012)Automatic allocation of identifiers in linear wireless sensor networks using link-level processes., , , and . LATINCOM, page 1-6. IEEE, (2016)Human-in-the-loop Connectivity Management in Smartphones., , , and . WWIC, volume 9674 of Lecture Notes in Computer Science, page 159-170. Springer, (2016)End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication., , and . Networking, page 1-9. IEEE Computer Society, (2013)Scalable Quantitative Delay Guarantee Support in DiffServ Networks Through NSIS., , , , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 1228-1233. Springer, (2006)Opportunistic fog computing: Feasibility assessment and architectural proposal., , and . IM, page 510-516. IEEE, (2017)