Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the efficiency of anonymous routing for MANETs., , and . Computer Communications, 35 (5): 619-627 (2012)A Dynamic Stateful Multicast Firewall., , , and . ICC, page 1280-1285. IEEE, (2007)Confidential and Secure Broadcast in Wireless Sensor Networks., , , and . PIMRC, page 1-5. IEEE, (2007)Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices., , and . IEEE Trans. Mob. Comput., 13 (12): 2763-2776 (2014)A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow., , and . ARES, page 147-156. IEEE Computer Society, (2016)Perspectives on Net Neutrality and Internet Fast-Lanes., , and . Computer Communication Review, 46 (1): 64-69 (2016)Perspectives on router buffer sizing: recent results and open problems., , and . Computer Communication Review, 39 (2): 34-39 (2009)Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks., , , , and . EURASIP J. Wireless Comm. and Networking, (2011)Transmission Power Control in Body Area Sensor Networks for Healthcare Monitoring., , , and . IEEE Journal on Selected Areas in Communications, 27 (1): 37-48 (2009)Comparing edge and host traffic pacing in small buffer networks., , and . Computer Networks, (2015)