Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards flexible credential verification in mobile ad-hoc networks., and . POMC, page 58-65. ACM, (2002)Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification., and . IAS, page 6-11. IEEE, (2014)Run-Time Probabilistic Model Checking for Failure Prediction: A Smart Lift Case Study., , , and . WF-IoT, page 1-7. IEEE, (2022)Policy-based Management for Body-Sensor Networks., , , , , , , , , and 1 other author(s). BSN, page 92-98. Springer, (2007)Vesta: A secure and autonomic system for pervasive healthcare., , , and . PervasiveHealth, page 1-8. IEEE, (2009)Performance Evaluation of Big Data Processing at the Edge for IoT-Blockchain Applications., , , and . GLOBECOM, page 1-6. IEEE, (2019)A Non-GPS based Location Tracking of Public Buses using Bluetooth Proximity Beacons., and . WF-IoT, page 606-611. IEEE, (2019)An implementation experience of domain management in marlin., and . Digital Rights Management Workshop, page 29-38. ACM, (2009)SEABASS: Symmetric-keychain encryption and authentication for building automation systems., , , and . WF-IoT, page 219-224. IEEE, (2018)Infrastructure-Based Pedestrian Risk Tagging Methodology to Support AV Risk Assessment., , , and . IEEE Access, (2022)