Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analytical characterization of the blockage process in 3GPP New Radio systems with trilateral mobility and multi-connectivity., , and . Comput. Commun., (2019)Corrigendum: Analytical performance estimation of network-assisted D2D communications in urban scenarios with rectangular cells., , , , , , , , and . Trans. Emerg. Telecommun. Technol., (2017)A novel security-centric framework for D2D connectivity based on spatial and social proximity., , , , , and . Comput. Networks, (2016)Approximate computing in B5G and 6G wireless systems: A survey and future outlook., , , , and . Comput. Networks, (September 2023)Demystifying Blockchain Technology for Resource-Constrained IoT Devices: Parameters, Challenges and Future Perspective., , and . IEEE Access, (2021)Dynamic Trust Associations Over Socially-Aware D2D Technology: A Practical Implementation Perspective., , , , , , and . IEEE Access, (2016)Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges., , , , , and . IEEE Access, (2017)Modeling Three-Dimensional Interference and SIR in Highly Directional mmWave Communications., , , , , , and . GLOBECOM, page 1-7. IEEE, (2017)Fast Real-World Implementation of a Direction of Arrival Method for Constrained Embedded IoT Devices., , , , and . IOT, page 1-8. ACM, (2022)A Survey of Security in Cloud, Edge, and Fog Computing., , , and . Sensors, 22 (3): 927 (2022)