Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing communication in inter domains Internet of Things using identity-based cryptography., and . IWBIS, page 137-142. IEEE, (2017)On preventing bitcoin transaction from money laundering in Indonesia: Analysis and recommendation on regulations., , and . IWBIS, page 143-148. IEEE, (2017)RFID Added Value Sensing Capabilities: European Advances in Integrated RFID-WSN Middleware., , , and . SECON, page 1-3. IEEE, (2010)Capability-based access control delegation model on the federated IoT network., , , and . WPMC, page 604-608. IEEE, (2012)Efficient and scalable location and mobility management of EPCglobal RFID system., , , and . WPMC, page 1-6. IEEE, (2013)An Intrusion Detection game in access control system for the M2M local cloud platform., , and . APCC, page 345-350. IEEE, (2013)Ablation Study of Deep Reinforcement Learning Congestion Control in Cellular Network Settings., and . WPMC, page 80-85. IEEE, (2022)BETaaS Platform - A Things as a Service Environment for Future M2M Marketplaces., , , , , , , , , and 3 other author(s). IoT360 (1), volume 150 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 305-313. Springer, (2014)Secure capability-based access control in the M2M local cloud platform., , and . VITAE, page 1-5. IEEE, (2014)Aggregate Authentication for Massive Internet of Things in 5G Networks., , , , and . MobiSec, volume 1121 of Communications in Computer and Information Science, page 3-12. Springer, (2019)