Author of the publication

An unsupervised approach for traffic trace sanitization based on the entropy spaces.

, , , , and . Telecommunication Systems, 61 (3): 609-626 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CT4RDD: Classification trees for research on digital divide., , , , , , and . Expert Syst. Appl., 40 (14): 5779-5786 (2013)Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols., , , and . ARES, page 701-708. IEEE Computer Society, (2008)Mobile Payment Protocol for Micropayments: Withdrawal and Payment Anonymous., , and . NTMS, page 1-5. IEEE, (2008)Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms., , , and . ARES, page 1000-1007. IEEE Computer Society, (2008)Segmentation of the ECG Signal by Means of a Linear Regression Algorithm., , , , , , and . Sensors, 19 (4): 775 (2019)Study of mobile payment protocols and its performance evaluation on mobile devices., , and . IJITM, 9 (3): 337-356 (2010)Application of Electronic Currency on the Online Payment System like PayPal., and . I3E, volume 226 of IFIP, page 44-56. Springer, (2006)A flexible mobile ticket for intelligent public transportation., , , and . CCE, page 1-6. IEEE, (2015)Weaknesses of an Improvement Authentication Scheme using., and . IACR Cryptology ePrint Archive, (2012)P2PM-pay: Person to Person Mobile Payment Scheme Controlled by Expiration Date., , , and . Wireless Personal Communications, 85 (1): 289-304 (2015)