Author of the publication

On cellular network planning and operation with M2M signalling and security considerations.

, , , and . ICC Workshops, page 429-434. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices., , and . SecureComm, page 240-242. IEEE, (2005)SmartSSL: Efficient Policy-Based Web Security., , , and . AICCSA, page 833-839. IEEE Computer Society, (2007)ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud., , , , and . Future Generation Comp. Syst., (2014)The average capacitor current method for delay calculation in MOS circuits.. IEEE Trans. Education, 47 (3): 330-339 (2004)Stochastic hardware architectures: A survey., , , and . ICEAC, page 1-6. IEEE, (2012)Energy-efficient platform-as-a-service security provisioning in the cloud., , and . ICEAC, page 1-6. IEEE, (2011)DAGGER: Distributed architecture for granular mitigation of mobile based attacks., , , and . AICCSA, page 259-265. IEEE Computer Society, (2014)PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems., , , and . ATC, volume 4158 of Lecture Notes in Computer Science, page 205-216. Springer, (2006)Automated device for determination of skin lesion regions., , , and . SAC, page 859-860. ACM, (2009)EmuNET: a real-time network emulator., and . SAC, page 357-362. ACM, (2004)