Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical location service for wireless sensor networks with mobile sinks., , , and . Wireless Communications and Mobile Computing, 10 (7): 899-911 (2010)Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards., , , , and . J. Network and Computer Applications, 34 (1): 73-79 (2011)Quantum Fisher information for superpositions of spin states., , , and . Quantum Information & Computation, 10 (5&6): 498-508 (2010)MEMOSEN: Multi-radio Enabled MObile Wireless SEnsor Network., and . AINA (2), page 291-295. IEEE Computer Society, (2006)A Secure and Efficient Remote User Authentication Scheme for Multi-server Environments Using ECC., , , and . TIIS, 8 (8): 2930-2947 (2014)An new approach to multi-layer network survivability: strategies, model and algorithm., , , , and . J. High Speed Networks, 10 (2): 127-134 (2001)Modeling adsorption-desorption processes in porous media., and . Computing in Science and Engineering, 1 (1): 84-91 (1999)Deploying Multiple Mobile Sinks in Event-Driven WSNs., , , , and . ICC, page 2293-2297. IEEE, (2008)Shift Coding: Efficient State Update in Mobile Peer-to-Peer Multiplayer Games., , , , , , and . ICPP Workshops, page 58. IEEE Computer Society, (2007)Opportunistic Auto-Adaptive Dissemination in Vehicular Ad-hoc Networks., , and . NetCoM, page 40-45. IEEE Computer Society, (2009)