Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Convergence time analysis of OSPF routing protocol using social network metrics., , , , and . Future Generation Comp. Syst., (2019)Dynamic task mapping for Network-on-Chip based systems., , , and . Journal of Systems Architecture - Embedded Systems Design, 61 (7): 293-306 (2015)A taxonomy and survey on Green Data Center Networks., , , , , , , , , and 4 other author(s). Future Generation Comp. Syst., (2014)A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification., , , , , and . IEEE Trans. Information Forensics and Security, 12 (6): 1259-1268 (2017)Anonymous and formally verified dual signature based online e-voting protocol., , , , , , and . Cluster Computing, 22 (Suppl 1): 1703-1716 (2019)Formal Verification of the xDAuth Protocol., , , , , , , , and . IEEE Trans. Information Forensics and Security, 11 (9): 1956-1969 (2016)CloudNetSim++: A GUI Based Framework for Modeling and Simulation of Data Centers in OMNeT++., , , , , , , , and . IEEE Trans. Services Computing, 10 (4): 506-519 (2017)Identifying Deviations in Software Processes., , , , , , , and . IEEE Access, (2017)RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments., , , , and . J. Sensor and Actuator Networks, 6 (3): 17 (2017)Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes., , , , , , , , and . Inf. Sci., (2019)