Author of the publication

A Cross-layer Aware Imprinting Protocol for Personal Networks.

, and . ICNS, page 51. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building identity-based security associations for provider-provisioned virtual private networks., and . Telecommunication Systems, 39 (3-4): 215-222 (2008)Streaming an image through the eye: The retina seen as a dithered scalable image coder., , and . Sig. Proc.: Image Comm., 28 (8): 856-869 (2013)An On-demand Key Establishment Protocol for MANETs., , and . AINA (2), page 924. IEEE Computer Society, (2006)An Identity-Based Key Management Framework for Personal Networks., and . AINA Workshops (1), page 537-543. IEEE Computer Society, (2007)A novel bio-inspired static image compression scheme for noisy data transmission over low-bandwidth channels., , , and . ICASSP, page 3506-3509. IEEE, (2010)Another look at the retina as an image scalar quantizer., , and . ISCAS, page 3076-3079. IEEE, (2010)A secure P2P architecture for location management., , and . Mobile Data Management, page 22-26. ACM, (2005)A Cross-layer Aware Imprinting Protocol for Personal Networks., and . ICNS, page 51. IEEE Computer Society, (2007)Efficient Group Management For Inter-PN Access Control., , and . ICC, page 3148-3153. IEEE, (2007)Frames for Exact Inversion of the Rank Order Coder., , and . IEEE Trans. Neural Netw. Learning Syst., 23 (2): 353-359 (2012)