161 results on '"Luca Veltri"'
Search Results
2. Enabling Location Based Services with Privacy and Integrity Protection in Untrusted Environments through Blockchain and Secure Computation.
3. Interworking between LoRaWAN and non-LoRa IoT Systems.
4. Explainable Anomaly Detection of Synthetic Medical IoT Traffic Using Machine Learning.
5. IoT Attack Detection with Deep Learning Analysis.
6. A Scalable and Secure Publish/Subscribe-Based Framework for Industrial IoT.
7. Estimation of a Gaussian Source with Memory in Bursty Impulsive Noise.
8. Broker Bridging Mechanism for Providing Anonymity in MQTT.
9. Estimation of Correlated Gaussian Samples in Impulsive Noise.
10. NEMO: A Flexible Java-based Network Emulator.
11. A Token-based Protocol for Securing MQTT Communications.
12. IoTChain: A blockchain security architecture for the Internet of Things.
13. ZWT: A new cross-platform graphical interface framework for Java applications
14. MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities
15. Implementation of virtual network function chaining through segment routing in a linux-based NFV infrastructure.
16. An anonymization protocol for the Internet of Things.
17. A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord.
18. THORIN: an Efficient Module for Federated Access and Threat Mitigation in Big Stream Cloud Architectures.
19. PMSR - Poor Man's Segment Routing, a minimalistic approach to Segment Routing and a Traffic Engineering use case.
20. A P2P virtual core-network architecture for next-generation mobility networks.
21. NEMO: A flexible and highly scalable network EMulatOr
22. Internet of Things: Architectures, Protocols and Standards
23. Lightweight Session Initiation for the Internet of Things.
24. Blockchain Security and Privacy for the Internet of Things.
25. Iterative Receiver Design for the Estimation of Gaussian Samples in Impulsive Noise
26. 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications.
27. Performance evaluation of a SIP-based constrained peer-to-peer overlay.
28. A statistical blind technique for recognition of internet traffic with dependence enforcement.
29. Lightweight multicast forwarding for service discovery in low-power IoT networks.
30. mjCoAP: An Open-Source Lightweight Java CoAP Library for Internet of Things Applications.
31. Trust-based routing for Kademlia in a sybil scenario.
32. Batch-based group key management with shared key derivation in the Internet of Things.
33. CoSIP: A Constrained Session Initiation Protocol for the Internet of Things.
34. An OpenFlow-based testbed for information centric networking.
35. Supporting information-centric functionality in software defined networks.
36. Peer-to-Peer beyond file sharing: Where are P2P systems going?
37. A Multicast-Based Bootstrap Mechanism for Self-Organizing P2P Networks.
38. Effective Anomaly Detection Using Deep Learning in IoT Systems
39. A resilient architecture for DHT-based distributed collaborative environments.
40. Byzantine agreement for reputation management in DHT-based peer-to-peer networks.
41. Kademlia for data storage and retrieval in enterprise networks.
42. Byzantine Generals Problem in the Light of P2P Computing.
43. SIP roaming solution amongst different WLAN-based service providers.
44. UniWireless: a distributed open access network.
45. Seamless vertical handover of VoIP calls based on SIP Session Border Controllers.
46. Wireless LAN-3G Integration: Unified Mechanisms for Secure Authentication based on SIP.
47. A Next-Generation Core Network Architecture for Mobile Networks
48. A Sidecar Object for the Optimized Communication Between Edge and Cloud in Internet of Things Applications
49. DHCP-Based Authentication for Mobile Users/Terminals in a Wireless Access Network.
50. A Scalable and Self-Configuring Architecture for Service Discovery in the Internet of Things.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.