Author of the publication

Internet of Things: Security vulnerabilities and challenges.

, , and . ISCC, page 180-187. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security in Future Mobile Sensor Networks - Issues and Challenges., , , and . SECRYPT, page 278-286. SciTePress, (2010)Prehospital health care management platform., , , , , and . MobiHealth, page 152. ICST/IEEE, (2014)MMAN - a monitor for mobile ad hoc networks: design, implementation, and experimental evaluation., , and . WiNTECH, page 57-64. ACM, (2008)Visualizing and Aggregating Behavior for Trust Evaluation., and . CAMAD, page 1-6. IEEE, (2019)Calculating a node's reputation in a mobile ad hoc network., , and . IPCCC, page 303-307. IEEE, (2005)A wired-wireless testbed architecture for network layer experimentation based on ORBIT and VINI., , , , and . WiNTECH, page 83-90. ACM, (2007)A secure dynamic data aggregation system for citizen safety in emergency response scenarios., and . IWCMC, page 689-696. IEEE, (2012)A Framework for Key Management in Mobile Ad Hoc Networks., , and . ITCC (2), page 568-573. IEEE Computer Society, (2005)isbn: 0-7695-2315-3.Trusted Services for Risk Management in Work Environments., , and . MUE, page 177-182. IEEE Computer Society, (2011)Internet of Things: Security vulnerabilities and challenges., , and . ISCC, page 180-187. IEEE Computer Society, (2015)