Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards IoT Orchestrations with Security, Privacy, Dependability and Interoperability Guarantees., , , and . GLOBECOM, page 1-6. IEEE, (2019)Architectural Patterns for Secure IoT Orchestrations., , , , , and . GIoTS, page 1-6. IEEE, (2019)PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange., , , , , , , , , and 8 other author(s). CSR, page 538-545. IEEE, (2023)Lightweight Cryptography for Embedded Systems - A Comparative Analysis., , , and . DPM/SETOP, volume 8247 of Lecture Notes in Computer Science, page 333-349. Springer, (2013)The CE-IoT Framework for Green ICT Organizations: The interplay of CE-IoT as an enabler for green innovation and e-waste management in ICT., , , , , , and . DCOSS, page 436-442. IEEE, (2019)Analysis and composition of security primitives towards a framework that safeguards the confidentiality, integrity and availability of embedded systems: uSPBM - a secure policy-based management framework for ubiquitous smart devices. Technical University of Crete, Greece, (2016)National Archive of PhD Theses: oai:10442/37608.Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol., , , , , , and . ISCC, page 1193-1200. IEEE Computer Society, (2017)SecRoute: End-to-end secure communications for wireless ad-hoc networks., , , and . ISCC, page 558-563. IEEE Computer Society, (2017)DSAPE - Dynamic Security Awareness Program Evaluation., , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 258-269. Springer, (2014)Secure and Authenticated Access to LLN Resources Through Policy Constraints., , , and . WISTP, volume 9311 of Lecture Notes in Computer Science, page 271-280. Springer, (2015)