Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trace-based simulation for 6TiSCH., , and . Internet Technol. Lett., (2020)Lessons learned from large-scale dense IEEE802.15.4 connectivity traces., , and . CASE, page 145-150. IEEE, (2015)Industrial IEEE802.15.4e networks: Performance and trade-offs., , , and . ICC, page 604-609. IEEE, (2015)Enhancing the performance of RPL using a Receiver-Based MAC protocol in lossy WSNs., , and . ICT, page 191-194. IEEE, (2011)Performance of the Transport Layer Security Handshake Over 6TiSCH., , , , and . Sensors, 21 (6): 2192 (2021)Using virtual coordinates for wireless sensor networks: Proof-of-concept experimentation., , , and . TRIDENTCOM, page 1-8. IEEE Computer Society, (2009)Atlas: Exploration and Mapping with a Sparse Swarm of Networked IoT Robots., , , , , and . DCOSS, page 338-342. IEEE, (2020)Performance Comparison of EDHOC and DTLS 1.3 in Internet-of-Things Environments., , and . WCNC, page 1-6. IEEE, (2024)EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis., , , , and . Computer, 57 (9): 101-110 (September 2024)Pre-Shared Key Authentication in Ephemeral Diffie-Hellman Over COSE., , and . IOTSMS, page 254-257. IEEE, (2024)