Author of the publication

Energy-efficient medium access control for energy harvesting communications.

, , , and . IEEE Trans. Consumer Electronics, 61 (4): 402-410 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Automatic Generation of Attack Trees and Attack Graphs., , , and . CoRR, (2023)Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study., , , and . HEALTHINF, page 383-388. SciTePress, (2017)Sustainable performance in energy harvesting: wireless sensor networks., , and . e-Energy, page 267-268. ACM, (2013)ODMAC: an on-demand MAC protocol for energy harvesting - wireless sensor networks., and . PE-WASUN, page 49-56. ACM, (2011)Mind the tracker you wear: a security analysis of wearable health trackers., , and . SAC, page 131-136. ACM, (2016)Medium access control for thermal energy harvesting in advanced metering infrastructures., , , and . EUROCON, page 291-299. IEEE, (2013)Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot., , and . ARES, page 22:1-22:8. ACM, (2018)UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things., , and . CoRR, (2019)Why Hackers Love eHealth Applications., and . HealthyIoT, volume 187 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 58-63. (2016)Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study., and . HealthyIoT, volume 187 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 165-170. (2016)