Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Method for providing secure and private fine-grained access to outsourced data., , , and . LCN, page 406-409. IEEE Computer Society, (2015)Poster: Fair Scheduling for Energy Harvesting WSN in Smart City., , and . SenSys, page 419-420. ACM, (2015)A Collaborative Reputation System Based on Credibility Propagation in WSNs., , , and . ICPADS, page 1-8. IEEE Computer Society, (2015)Interdependent Security Risk Analysis of Hosts and Flows., , , , and . IEEE Trans. Information Forensics and Security, 10 (11): 2325-2339 (2015)Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna., , , and . Pervasive and Mobile Computing, (2016)Recent directions in virtual private network solutions., , and . ICON, page 217-223. IEEE, (2003)An Adaptive Resource Management Architecture for Active Networks., and . Telecommunication Systems, 24 (2-4): 139-166 (2003)Empirical study of traffic trunking in Linux-based MPLS test-bed., , and . Int. Journal of Network Management, 13 (4): 277-288 (2003)Scheduling Resources in Programmable and Active Networks Based on Adaptive Estimations., and . LCN, page 2-11. IEEE Computer Society, (2003)An Analysis of Virtual Private Network Solutions., , and . LCN, page 395-. IEEE Computer Society, (2003)