Author of the publication

Trust and Reputation Management for Securing Collaboration in 5G Access Networks: The Road Ahead.

, , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification., and . IAS, page 6-11. IEEE, (2014)Vesta: A secure and autonomic system for pervasive healthcare., , , and . PervasiveHealth, page 1-8. IEEE, (2009)Performance Evaluation of Big Data Processing at the Edge for IoT-Blockchain Applications., , , and . GLOBECOM, page 1-6. IEEE, (2019)Policy-based Management for Body-Sensor Networks., , , , , , , , , and 1 other author(s). BSN, page 92-98. Springer, (2007)Run-Time Probabilistic Model Checking for Failure Prediction: A Smart Lift Case Study., , , and . WF-IoT, page 1-7. IEEE, (2022)Towards flexible credential verification in mobile ad-hoc networks., and . POMC, page 58-65. ACM, (2002)An implementation experience of domain management in marlin., and . Digital Rights Management Workshop, page 29-38. ACM, (2009)SEABASS: Symmetric-keychain encryption and authentication for building automation systems., , , and . WF-IoT, page 219-224. IEEE, (2018)A Non-GPS based Location Tracking of Public Buses using Bluetooth Proximity Beacons., and . WF-IoT, page 606-611. IEEE, (2019)Infrastructure-Based Pedestrian Risk Tagging Methodology to Support AV Risk Assessment., , , and . IEEE Access, (2022)