Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the impact of user mobility on peer-to-peer video streaming., , , , , , , and . IEEE Wireless Commun., 15 (6): 54-62 (2008)Context adaptation in delay and disruption tolerant networks., , , and . GIIS, page 1-6. IEEE, (2012)Neighbor discovery time in schedule-based asynchronous duty cycling., , , and . Wireless Days, page 1-3. IEEE, (2012)Towards a Blockchain-Based Secure Electronic Medical Record for Healthcare Applications., , , , , , , , , and . ICC, page 1-6. IEEE, (2019)Collision probability estimation in wireless networks., , and . LATINCOM, page 1-6. IEEE, (2016)A Survey of Application-level Multicast Group Communication and a Proposal for Intelligent Reflectors., and . Net-Con, volume 213 of IFIP, page 117-126. Springer, (2006)Fault detection and diagnosis for solar-powered Wireless Mesh Networks using machine learning., , , , , and . IM, page 456-462. IEEE, (2017)A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack., , , and . Security and Communication Networks, (2018)Saving Resources in Discovery Protocol on Delay-Sensitive Rescue Mobile Networks., , , and . AINA, page 538-545. IEEE Computer Society, (2017)Practical Evaluation of a Secure Key-Distribution and Storage Scheme for Wireless Sensor Networks Using TinyOS., , , and . CLEI Electron. J., (2011)