Author of the publication

Lightweight robust cryptographic combiner for mobile devices: Crypto roulette.

, , , , and . CAMAD, page 188-192. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating Ubiquitous Intelligent Sensing Environments (CRUISE)., and . WINSYS, page 355-361. INSTICC Press, (2006)Cost/revenue performance in an IMT-Advanced scenario with Spectrum Aggregation over non-contiguous frequency bands., , , , , , , , , and . ICT, page 257-261. IEEE, (2014)Lightweight, Distributed Access Control for Wireless Sensor Networks Supporting Mobility., , , , and . ICC, page 1441-1445. IEEE, (2008)Identity Theft Detection Based on Neural Network Non-Linearity Identification in OFDM System., , and . ICC, page 1-5. IEEE, (2011)Ubiquitous Access Control and Policy Management in Personal Networks., , and . MobiQuitous, page 1-6. IEEE Computer Society, (2006)Coverage improvement in clustered wireless sensor networks by relocating mobile nodes based on waypoints., , , and . WPMC, page 1-5. IEEE, (2013)A Novel Dimension of Cooperation in 4G., , , , and . IEEE Technol. Soc. Mag., 27 (1): 29-40 (2008)Context-aware privacy protection with profile management., , and . WMASH, page 53-62. ACM, (2006)Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks., , and . IJDCF, 3 (1): 14-36 (2011)A Framework for Planning a Unified Wired and Wireless ICT Infrastructure., , , , and . Wireless Personal Communications, 54 (1): 169-185 (2010)