Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles., , and . NordSec, volume 7127 of Lecture Notes in Computer Science, page 33-48. Springer, (2010)Power consumption in remote gaming: An empirical evaluation., , , , and . INFOCOM Workshops, page 736-741. IEEE, (2016)Device group management in constrained networks., , , and . PerCom Workshops, page 1-6. IEEE Computer Society, (2016)State of the Art in Enablers for Applications in Future Mobile Wireless Internet, , , , , , , , and . HIIT Publication, 2004-2. Helsinki Institute for Information Technology, Helsinki, Finland, (September 2004)An SDN-based approach to enhance the end-to-end security: SSL/TLS case study., , , and . NOMS, page 281-288. IEEE, (2016)Techno-economic feasibility analysis of constrained application protocol., , and . WF-IoT, page 153-158. IEEE Computer Society, (2014)Hypervisors vs. Lightweight Virtualization: A Performance Comparison., , and . IC2E, page 386-393. IEEE Computer Society, (2015)Anatomy of the connecting architecture of Internet of Things., , , , and . CCIS, page 1230-1234. IEEE, (2012)Benchmarking Q-Learning Methods for Intelligent Network Orchestration in the Edge., , , , , , , , , and . 6G SUMMIT, page 1-5. IEEE, (2020)Application Programming Interfaces for the Host Identity Protocol. Master Thesis, (September 2004)