Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications., , , , , , and . Comput. Secur., (2018)Virtual Reality as an Environment for CBR., and . EWCBR, volume 1488 of Lecture Notes in Computer Science, page 448-459. Springer, (1998)A Hybrid Architecture for Experimentation in Wireless Sensor Networks., , , , and . SBESC, page 116-121. IEEE Computer Society, (2016)Prior-guided Bayesian Optimization, , , , , and . arxiv:2006.14608cs.LG, (June 2020)Implementation of a Pseudonym-Based Signature Scheme with Bilinear Pairings on Android., , , and . CrownCom, volume 228 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 75-87. Springer, (2017)The Two Sides of the Innovation Coin., and . AMCIS, Association for Information Systems, (2016)On Evaluating Data Preprocessing Methods for Machine Learning Models for Flight Delays., , , , and . IJCNN, page 1-8. IEEE, (2018)NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks., , , , and . EWSN, volume 4913 of Lecture Notes in Computer Science, page 305-320. Springer, (2008)FLAT: Federated lightweight authentication for the Internet of Things., , , , , and . Ad Hoc Networks, (2020)ID-MAC: An identity-based MAC protocol for Wireless Sensor Networks., , , , and . ISCC, page 975-981. IEEE Computer Society, (2013)