Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on Security-Aware Measurement in SDN., , , , , and . Security and Communication Networks, (2018)A Language for Reliable Service Composition., , and . SOFSEM (1), volume 4362 of Lecture Notes in Computer Science, page 554-565. Springer, (2007)Efficient Misplaced-Tag Pinpointing in Large RFID Systems., , , and . IEEE Trans. Parallel Distrib. Syst., 23 (11): 2094-2106 (2012)Privacy-Preserving Multi-Point Traffic Volume Measurement Through Vehicle-to-Infrastructure Communications., , , , and . IEEE Trans. Vehicular Technology, 64 (12): 5619-5630 (2015)Point-to-Point Traffic Volume Measurement through Variable-Length Bit Array Masking in Vehicular Cyber-Physical Systems., , , and . ICDCS, page 51-60. IEEE Computer Society, (2015)Efficient anonymous category-level joint Tag estimation., , , and . ICNP, page 1-10. IEEE Computer Society, (2016)Multihop Range-Free Localization in Anisotropic Wireless Sensor Networks: A Pattern-Driven Scheme., , , and . IEEE Trans. Mob. Comput., 9 (11): 1592-1607 (2010)Reliable Anchor-Based Sensor Localization in Irregular Areas., , , and . IEEE Trans. Mob. Comput., 9 (1): 60-72 (2010)Modeling and Defending against Adaptive BitTorrent Worms in Peer-to-Peer Networks., , , , and . TAAS, 9 (1): 5:1-5:17 (2014)Robust localization against outliers in wireless sensor networks., , , and . TOSN, 9 (2): 24:1-24:26 (2013)