Author of the publication

Achieving Data Dissemination with Security using FIWARE and Intel Software Guard Extensions (SGX).

, , , and . ISCC, page 1-7. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications., , , , , and . IEEE Access, (2021)Intel Software Guard Extensions in Internet of Things Scenarios: A Systematic Mapping Study., , , and . FiCloud, page 342-349. IEEE, (2021)Trusted Execution Environments for Cloud/Fog-based Internet of Things Applications., , , , , and . CLOSER, page 111-121. SCITEPRESS, (2021)An Interoperable Microservices Architecture for Healthcare Data Exchange., , , , and . AINA (3), volume 655 of Lecture Notes in Networks and Systems, page 193-205. Springer, (2023)Formal verification for security and attacks in IoT physical layer., , , , and . J. Reliab. Intell. Environ., 10 (1): 73-91 (March 2024)A mobility-aware federated learning coordination algorithm., , , and . J. Supercomput., 79 (17): 19049-19063 (November 2023)Security Challenges and Recommendations in 5G-IoT Scenarios., , , , , and . AINA (1), volume 661 of Lecture Notes in Networks and Systems, page 558-573. Springer, (2023)Towards 802.11g Signal Strength Estimation in an Industrial Environment: A Practical Study., , , , , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 559-570. Springer, (2019)Mobile Data Security with Attribute-based Encryption and Confidential Computing., , , and . ICCE, page 1-4. IEEE, (2024)Investigating technological risks and mitigation strategies in software projects., , , , , , and . SAC, page 1527-1535. ACM, (2022)