Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Geographic Routing in Wireless Sensor Networks with Innacurate Location Information., and . ADHOC-NOW, volume 6811 of Lecture Notes in Computer Science, page 1-14. Springer, (2011)BOSS: Beacon-less On Demand Strategy for Geographic Routing inWireless Sensor Networks., , and . MASS, page 1-10. IEEE Computer Society, (2007)SBGR: A Simple Self-Protected Beaconless Geographic Routing for Wireless Sensor Networks., and . MASS, page 610-619. IEEE Computer Society, (2011)Secure bootstrapping and header compression for IoT constrained networks., , , , and . GIoTS, page 1-6. IEEE, (2020)Holistic IoT Architecture for Secure Lightweight Communication, Firmware Update, and Trust Monitoring., , , and . SmartIoT, page 353-358. IEEE, (2021)Scalable Oriented-Service Architecture for Heterogeneous and Ubiquitous IoT Domains., , , , and . CoRR, (2013)EAP-Based Bootstrapping for Secondary Service Authentication to Integrate IoT into 5G Networks., , , and . MobiSec, volume 1121 of Communications in Computer and Information Science, page 13-22. Springer, (2019)MEC-based architecture for interoperable and trustworthy internet of moving things., , , and . Digit. Commun. Networks, 9 (1): 270-279 (February 2023)Impact of the Pre-Authentication Performance in Vehicular Networks., , and . VTC Fall, page 1-5. IEEE, (2010)BRUMA: Beacon-less geographic routing for multicast applications., , and . LCN, page 522-529. IEEE Computer Society, (2009)