Author of the publication

Security Access Protocols in IoT Networks with Heterogenous Non-IP Terminals.

, , , and . DCOSS, page 257-262. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of packet loss probability in Bluetooth networks., , , and . ICC, page 313-317. IEEE, (2002)Power Consumption Analysis and Dimensioning of UMTS-LTE with Relays., , and . MoWNet, volume 40 of Procedia Computer Science, page 74-83. Elsevier, (2014)An always available control channel for cooperative sensing in cognitive radio networks., , , , and . Wireless Days, page 1-5. IEEE, (2010)Wireless technologies advances for emergency and rural communications., and . Wirel. Commun. Mob. Comput., 10 (9): 1159-1161 (2010)Detect and Avoid Procedure for UWB Interference Mitigation on Narrowband Systems., , , , and . ISWCS, page 428-432. IEEE, (2006)Planning issues for Point-to-MultiPoint OFDMA-based networks., , , and . ISWCS, page 348-352. IEEE, (2006)Dimensioning of OFDM/OFDMA-Based Cellular Networks Using Exponential Effective SINR., and . IEEE Trans. Vehicular Technology, 58 (8): 4204-4213 (2009)Capacity analysis for a power controlled UWB indoor system., and . PIMRC, page 724-728. IEEE, (2004)Promoting Efficient Infrastructure Competition through Vectoring and Enlarged DSL Bandwidth., , and . CoRR, (2016)A joint Computer Vision and Reconfigurable Intelligent Meta-surface Approach for Interference Reduction in Beyond 5G Networks., , , , and . HPSR, page 1-6. IEEE, (2021)