Author of the publication

A Wireless Sensor Network Testbed for Event Detection in Smart Homes.

, , and . DCOSS, page 321-322. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized Enterprises., , , , , , , , , and 22 other author(s). MeditCom, page 500-505. IEEE, (2021)PALANTIR demo: leveraging SecaaS model for managing threats in industrial environments., , , , , , , , , and 19 other author(s). MeditCom, page 82-85. IEEE, (2022)Evolution of the e-Museum Concept through Exploitation of Cryptographic Algorithms., , , and . EuroMed, volume 7616 of Lecture Notes in Computer Science, page 291-300. Springer, (2012)Optimal sensor placement for bacteria detection in water distribution networks., , and . ISCCSP, page 248-253. IEEE, (2014)Ultra High Speed SHA-256 Hashing Cryptographic Module for IPSec Hardware/Software Codesign., , , , , and . SECRYPT, page 309-313. SciTePress, (2010)High-performance FPGA implementations of the cryptographic hash function JH., , , and . IET Comput. Digit. Tech., 7 (1): 29-40 (2013)LAC: Load-aware channel selection in 802.11 WLANs., , , and . PIMRC, page 1-6. IEEE, (2008)Harmonizing MAC and routing in low power and lossy networks., , , and . GLOBECOM, page 231-236. IEEE, (2013)MAC-aware routing metrics for low power and lossy networks., , , and . INFOCOM, page 13-14. IEEE, (2013)On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function., , , , and . SECRYPT, page 270-275. SciTePress, (2012)