Author of the publication

Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms.

, , , and . ARES, page 1000-1007. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PREON: An efficient cascade revocation mechanism for delegation paths., , , and . Computers & Security, 29 (6): 697-711 (2010)Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis., , , , and . Inf. Sci., (2019)Smart Deferral of Messages for Privacy Protection in Online Social Networks., , , and . CoRR, (2014)Privacy-Preserving Enhanced Collaborative Tagging., , , , and . IEEE Trans. Knowl. Data Eng., 26 (1): 180-193 (2014)A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks., , , , , , , and . Sensors, 15 (4): 9039-9077 (2015)A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS., , and . ARES, page 791-798. IEEE Computer Society, (2007)Reconciling privacy and efficient utility management in smart cities., , , , and . Trans. Emerging Telecommunications Technologies, 25 (1): 94-108 (2014)Using OCSP to Secure Certificate-Using Transactions in M-commerce., , , and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 280-292. Springer, (2003)Measuring the privacy of user profiles in personalized information systems., , and . Future Generation Comp. Syst., (2014)A modification of the k-means method for quasi-unsupervised learning., , , and . Knowl.-Based Syst., (2013)