Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pairing-Based Cryptography on the Internet of Things: A Feasibility Study., , , , and . WWIC, volume 10866 of Lecture Notes in Computer Science, page 219-230. Springer, (2018)Load-Aware Scheduling in Local Area Networks Using Clustering., , , , , and . CSCN, page 93. IEEE, (2022)Security analysis of NFC relay attacks using probabilistic model checking., , and . IWCMC, page 524-529. IEEE, (2014)Demo abstract: An experimentation facility enabling flexible network control for the Internet of Things., , , , and . INFOCOM Workshops, page 992-993. IEEE, (2017)Energy-efficiency analysis under QoS constraints using formal methods: A study on EPONs., , and . ICC, page 1-6. IEEE, (2017)A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks., , , and . Future Gener. Comput. Syst., (2021)Dynamic Topology Discovery Configuration in Software-Defined Vehicular Networks., , , and . CSCN, page 124-130. IEEE, (2022)A Multi-domain Experimentation Environment for 5G Media Verticals., , , and . INFOCOM Workshops, page 461-466. IEEE, (2019)Towards energy consumption evaluation of the SSL handshake protocol in mobile communications., and . WONS, page 135-138. IEEE, (2012)Quantitative model checking for assessing the energy impact of a MITM attack on EPONs., , , and . Internet Technol. Lett., (2022)