Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DCIL: Devices Collaboration Indoor Localization with Soft AP., , , , and . Ad Hoc & Sensor Wireless Networks, 30 (1-2): 47-64 (2016)Learning-Aided User Identification Using Smartphone Sensors for Smart Homes., , , , , , and . IEEE Internet of Things Journal, 6 (5): 7760-7772 (2019)ContainerGuard: A Real-Time Attack Detection System in Container-Based Big Data Platform., , , , , , and . IEEE Trans. Ind. Informatics, 18 (5): 3327-3336 (2022)Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach., , , , , and . IEEE Access, (2019)Message Authentication Code over a wiretap channel., , and . ISIT, page 2301-2305. IEEE, (2015)Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things., , , and . Mobile Information Systems, (2017)SmokeGrenade: A Key Generation Protocol with Artificial Interference in Wireless Networks., , , , , and . MASS, page 200-208. IEEE Computer Society, (2013)SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference., , , , , and . IEEE Trans. Information Forensics and Security, 8 (11): 1731-1745 (2013)Physical Layer Security for Internet of Things., , , , and . Wireless Communications and Mobile Computing, (2019)Rate Efficient Authentication over a Wiretap Channel., , and . CoRR, (2013)