Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security for the Industrial IoT: The Case for Information-Centric Networking., , , , , , , and . WF-IoT, page 424-429. IEEE, (2019)RIOT: An Open Source Operating System for Low-End Embedded Devices in the IoT., , , , , , , , and . IEEE Internet Things J., 5 (6): 4428-4440 (2018)Artifacts for "Securing Name Resolution in the IoT: DNS over CoAP"., , , , , and . (July 2023)The Impact of Networking Protocols on Massive M2M Communication in the Industrial IoT., , , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (4): 4814-4828 (2021)Understanding IoT Domain Names: Analysis and Classification Using Machine Learning., , , , , , and . CoRR, (2024)Securing Name Resolution in the IoT: DNS over CoAP., , , , , and . PACMNET, 1 (CoNEXT2): 6:1-6:25 (2023)Securing name resolution in the IoT: DNS over CoAP., , , , , and . CoRR, (2022)Securing name resolution in the IoT: DNS over CoAP., , , , and . StudentWorkshop@CoNEXT, page 11-12. ACM, (2021)Connecting the Dots: Selective Fragment Recovery in ICNLoWPAN., , , and . ICN, page 70-76. ACM, (2020)A Lesson in Scaling 6LoWPAN - Minimal Fragment Forwarding in Lossy Networks., , and . LCN, page 438-446. IEEE, (2019)