Author of the publication

Security Assessment of Blockchains in Heterogenous IoT Networks : Invited Presentation.

, and . CISS, page 1-4. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Carrier Waveforms and Multiple Access Strategies in Wireless Networks: Performance, Applications, and Challenges., , , , and . IEEE Access, (2022)Security Assessment of Blockchains in Heterogenous IoT Networks : Invited Presentation., and . CISS, page 1-4. IEEE, (2019)A Comparative Analyses of Current IoT Middleware Platforms., , and . FiCloud, page 413-420. IEEE, (2021)Energy Efficient Cellular Network User Clustering Using Linear Radius Algorithm., , and . CISS, page 1-5. IEEE, (2019)Design and Optimization of a 71 Gb/s Injection-locked CDR., , , and . ISCAS, page 177-180. IEEE, (2009)Silicon millimeter wave ICs, VCOs, and dividers., and . CICC, page 556-557. IEEE, (2005)Integrated DC-DC converter design for improved WCDMA power amplifier efficiency in SiGe BiCMOS technology., and . ISLPED, page 449-454. ACM, (2003)High-level synthesis techniques for functional test pattern execution1., , , and . Integr., 25 (2): 161-180 (1998)Template Attack Against AES in Counter Mode With Unknown Initial Counter., , , , , , , , and . CCWC, page 525-533. IEEE, (2023)Energy Efficient Smart Antenna Beamforming Algorithms for Next-Generation Networks., , and . CCWC, page 1106-1113. IEEE, (2021)