Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Intrusion Detection for the Security of Societies of Robots, , and . CoRR, (2011)Performance and Security Evaluation of SDN Networks in OMNeT++/INET., , and . CoRR, (2016)A Component-Based Approach to the Design of Networked Control Systems., , , , , , and . Eur. J. Control, 13 (2-3): 261-279 (2007)An Algorithm for Reconnecting Wireless Sensor Network Partitions., , and . EWSN, volume 4913 of Lecture Notes in Computer Science, page 253-267. Springer, (2008)Consensus-based distributed intrusion detection for multi-robot systems., , , , and . ICRA, page 120-127. IEEE, (2008)SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks., , and . J. Inf. Secur. Appl., (2021)Drone Path Planning for Secure Positioning and Secure Position Verification., , , , and . IEEE Trans. Mob. Comput., 16 (9): 2478-2493 (2017)Password systems: Design and implementation., and . Comput. Electr. Eng., (2015)A Social-Feedback Enriched Interface for Software Download., , , and . JOEUC, 25 (1): 24-42 (2013)Scalable and Secure Group Rekeying in Wireless Sensor Networks., and . Parallel and Distributed Computing and Networks, page 84-88. IASTED/ACTA Press, (2006)