Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reconciling privacy and efficient utility management in smart cities., , , , and . Trans. Emerg. Telecommun. Technol., 25 (1): 94-108 (2014)Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm., , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 526-539. Springer, (2007)Providing k-anonymity and revocation in ubiquitous VANETs., , , , and . Ad Hoc Networks, (2016)Privacy risk analysis in the IoT domain., , , , , and . GIoTS, page 1-6. IEEE, (2018)Multimedia Copyright Protection Platform Demonstrator., , , , , , and . iTrust, volume 3477 of Lecture Notes in Computer Science, page 411-414. Springer, (2005)Energy Efficiency of Load Balancing in MANET Routing Protocols., , and . SNPD, page 476-483. IEEE Computer Society, (2005)Low-Power Low-Rate Goes Long-Range: The Case for Secure and Cooperative Machine-to-Machine Communications., , , , and . Networking Workshops, volume 6827 of Lecture Notes in Computer Science, page 219-230. Springer, (2011)Design of a P2P content recommendation system using affinity networks., , , and . Comput. Commun., 36 (1): 90-104 (2012)WiMAX-based robust localization in the presence of misbehaving and/or malicious base stations., , and . Comput. Electr. Eng., 39 (7): 2318-2329 (2013)Secure Lossless Aggregation Over Fading and Shadowing Channels for Smart Grid M2M Networks., , , , , and . IEEE Trans. Smart Grid, 2 (4): 844-864 (2011)