Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Customizing a Geographical Routing Protocol for Wireless Sensor Networks., , and . ITCC (2), page 586-591. IEEE Computer Society, (2005)isbn: 0-7695-2315-3.A robust group-based key management scheme for wireless sensor networks., and . WCNC, page 1915-1920. IEEE, (2005)FishEYE: A Forensic Tool for the visualization of change-over-time in Windows VSS., and . SADFE, page 1-7. IEEE, (2013)Formal Modelling of PLC Systems by BIP Components., , , , and . COMPSAC, page 512-518. IEEE Computer Society, (2013)A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery., and . IFIP Int. Conf. Digital Forensics, volume 194 of IFIP, page 79-90. Springer, (2005)A dynamic en-route filtering scheme for data reporting in wireless sensor networks., and . IEEE/ACM Trans. Netw., 18 (1): 150-163 (2010)Gather/scatter hardware support for accelerating Fast Fourier Transform., , and . Journal of Systems Architecture - Embedded Systems Design, 56 (12): 667-684 (2010)Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs., , and . Computer Communications, 28 (14): 1618-1630 (2005)Virtual Machine Image Content Aware I/O Optimization for Mobile Virtualization., , , , , and . HPCC/CSS/ICESS, page 1031-1036. IEEE, (2015)Formal Modeling and Verification of the Safety Critical Fire-Fighting Control System., , , , , and . COMPSAC Workshops, page 536-541. IEEE Computer Society, (2015)