Author of the publication

Standardisation advancements in the area of routing for mobile ad-hoc networks.

, , and . The Journal of Supercomputing, 64 (2): 409-434 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Probabilistic Algorithm for Secret Matrix Share Size Reduction., , and . EW, VDE-Verlag, (2013)Game Theory Meets Information Security Management., , , , and . SEC, volume 428 of IFIP Advances in Information and Communication Technology, page 15-29. Springer, (2014)Secure Message Delivery Games for Device-to-Device Communications., , , and . GameSec, volume 8840 of Lecture Notes in Computer Science, page 195-215. Springer, (2014)Standardisation advancements in the area of routing for mobile ad-hoc networks., , and . The Journal of Supercomputing, 64 (2): 409-434 (2013)Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks, , , and . CoRR, (2010)Comparing Decision Support Approaches for Cyber Security Investment., , , , and . CoRR, (2015)Security model for emergency real-time communications in autonomous networks., , , , and . Information Systems Frontiers, 14 (3): 541-553 (2012)An Efficient Power Control Algorithm for Supporting Cognitive Communications in Shared Spectrum Areas., , and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 496-505. Springer, (2010)Cybersecurity Games and Investments: A Decision Support Approach., , , , and . GameSec, volume 8840 of Lecture Notes in Computer Science, page 266-286. Springer, (2014)Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking., , , , and . TrustCom/BigDataSE/ISPA (1), page 1006-1013. IEEE, (2015)