Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deterministic Trust Management in Pervasive Computing., , and . J. Mobile Multimedia, 5 (1): 64-80 (2009)Advances in security and multimodality for pervasive computing environments - TS Special Issue., , , and . Telecommun. Syst., 52 (2): 1341-1342 (2013)Software agent-based directed diffusion in wireless sensor network., , and . Telecommun. Syst., 38 (3-4): 161-174 (2008)Enhanced Routing Metric for Load-Balancing in Wireless Mesh Networks., and . J. Interconnect. Networks, 8 (4): 407-426 (2007)The design and evaluation of fair scheduling in wireless mesh networks., and . J. Comput. Syst. Sci., 77 (4): 652-664 (2011)Data Security and Privacy Protection in Pervasive Computing Environments., , , and . J. Univers. Comput. Sci., 15 (5): 967-969 (2009)A Mobile Agent-Based Location Management Scheme for Mobile Ad-Hoc Networks., and . International Conference on Wireless Networks, page 703-706. CSREA Press, (2004)Limited flooding protocol for mobile ad hoc networks., and . South Afr. Comput. J., (2002)Advances in wireless networks., and . Mob. Inf. Syst., 5 (1): 1-3 (2009)Message from the Workshop Co-Organizers., , , , , and . PerCom Workshops, page 1-2. IEEE Computer Society, (2009)978-1-4244-3304-9.