Author of the publication

An audio/video crypto - Adaptive optical steganography technique.

, and . IWCMC, page 1057-1062. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimized bandwidth allocation with fairness and service differentiation in multimedia wireless networks., and . Wireless Communications and Mobile Computing, 8 (4): 501-511 (2008)SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks., and . Computer Communications, 30 (11-12): 2401-2412 (2007)Subscription Policy Control Framework for IMS-Based Networks., and . IJBDCN, 5 (3): 17-38 (2009)Identifying Bounds on Sensing Coverage Holes in IoT Deployments., , and . GLOBECOM, page 1-6. IEEE, (2015)Analysis of a Cell-based Call Admission Control Scheme for QoS Support in Multimedia Wireless Networks., and . ICCCN, page 1250-1255. IEEE, (2007)Utilizing CAN-Bus and smartphones to enforce safe and responsible driving., and . ISCC, page 111-115. IEEE Computer Society, (2015)Stochastic analysis for adaptive bandwidth allocation framework in wireless cellular networks.. WiMob (2), page 142-149. IEEE, (2005)0-7803-9181-0.Anytime and anywhere monitoring for the elderly., and . WiMob, page 429-433. IEEE Computer Society, (2010)Mitigating cross-network interference in cognitive spectrum sharing with opportunistic relaying., , , , and . ICC, page 1561-1566. IEEE, (2014)Prioritized multi-class adaptive framework for multimedia wireless networks., and . ICC, page 4295-4300. IEEE, (2004)