Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Strand Space Model to Verify the Privacy Properties of a Fair Anonymous Authentication Scheme., , and . Panhellenic Conference on Informatics, page 105-110. IEEE Computer Society, (2012)Privacy Threats of Data Retention in Internet Communications., and . PIMRC, page 1-4. IEEE, (2007)Routing in multimetric networks using a fuzzy link cost., and . ISCC, page 397-401. IEEE Computer Society, (1997)Demand and service matching at heavy loads: a dynamic bandwidth control mechanism for DQDB MANs., and . IEEE Trans. Communications, 44 (11): 1485-1495 (1996)Intrusion Detection with Neural Networks and Watermarking Techniques for MANET., , and . ICPS, page 118-127. IEEE Computer Society, (2007)Switching Theory Approach to Alarm Correlation in Network Management., and . LCN, page 452-461. IEEE Computer Society, (2000)Topological Dependence and Fault Tolerance in TDMA Based Power Conservation for WSNs., , , and . WINSYS, page 53-58. INSTICC Press, (2008)Pirus: A file storage service in cloud computing for educational use., , , , , and . EDUCON, page 416-421. IEEE, (2014)TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments., , , and . GLOBECOM, page 1979-1984. IEEE, (2008)An efficient approximate algorithm for delay-cost-constrained QoS routing., , , and . ICCCN, page 395-400. IEEE, (2001)