Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network., , , and . NOMS, page 603-606. IEEE, (2012)Defending Grids Against Intrusions., , , and . IWSOS/EuroNGI, volume 4124 of Lecture Notes in Computer Science, page 248-250. Springer, (2006)Hybrid approach to intrusion detection in fog-based IoT environments., , , , and . Comput. Networks, (2020)Using Fuzzy Specifications to Manage QoS., and . LANOMS, page 269-280. UFMG, (2001)Distribution of Network Management Policies with Emphasis on Quality of Service., and . LANOMS, page 213-224. UFRGS, (2005)An Experimentation on CoAP Multi Factor Authentication Mechanism with Reputation for Internet of Things Constrained Devices and Low Power Wide Area Network., , , and . ICOIN, page 67-72. IEEE, (2023)IoT Energy Management for Smart Homes' Water Management System., , , and . J. Circuits Syst. Comput., 32 (13): 2350217:1-2350217:24 (September 2023)A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic., , and . Sensors, 23 (15): 6933 (August 2023)Security management against cloned cellular telephones., , , and . ICON, page 356-363. IEEE, (1999)Security Approaches for Cluster Interconnection in a Wireless Sensor Network., and . APNOMS, volume 4238 of Lecture Notes in Computer Science, page 542-545. Springer, (2006)