Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exchanging Secrets without Using Cryptography, , , , , , and . CoRR, (2011)Epidemic-based reliable and adaptive multicast for mobile ad hoc networks., , and . Computer Networks, 53 (9): 1409-1430 (2009)Low cost security for sensor networks., , , and . NetCod, page 1-6. IEEE, (2013)A Classification and Performance Comparison of Mobility Models for Ad Hoc Networks., and . ADHOC-NOW, volume 4104 of Lecture Notes in Computer Science, page 444-457. Springer, (2006)Epidemic-based approaches for reliable multicast in mobile ad hoc networks., , and . Operating Systems Review, 40 (3): 73-79 (2006)SCALAR: Scalable data lookup and replication protocol for mobile ad hoc networks., and . Computer Networks, 57 (17): 3654-3672 (2013)SCALAR: Scalable Data Lookup and Replication Framework for Mobile Ad-hoc Networks., and . ICDCS Workshops, page 327-332. IEEE Computer Society, (2008)SCALAR data replication performance in mobile ad hoc applications., , and . ISCIS, page 369-374. IEEE, (2009)Towards integrating Quantize-Map-Forward relaying into LTE., , , and . ITW, page 212-216. IEEE, (2012)SenseCode: Network coding for reliable sensor networks., , , and . TOSN, 9 (2): 25:1-25:20 (2013)