Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An End-Systems Supported Highly Distributed Content Delivery Network., and . ICDCIT, volume 4882 of Lecture Notes in Computer Science, page 172-183. Springer, (2007)Gaussian Approximation-Based Lossless Compression of Smart Meter Readings., , and . IEEE Trans. Smart Grid, 9 (5): 5047-5056 (2018)Multi-Binomial mixes: A proposal for secure and efficient anonymous communication., and . Comput. Networks, (2015)Secure Edge of Things for Smart Healthcare Surveillance Framework., , , and . IEEE Access, (2019)Turbo-coded HARQ scheme in multi-hop cooperative wireless networks., and . WMNC, page 1-4. IEEE, (2013)Fully peer-to-peer virtual environments with 3D Voronoi diagrams., and . Computing, 94 (8-10): 679-700 (2012)A Practical Privacy-Preserving Recommender System., , and . Data Sci. Eng., 1 (3): 161-177 (2016)Walsh-Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care., and . IEEE Trans. Biomed. Eng., 64 (9): 2186-2195 (2017)Lightweight privacy preservation for secondary users in cognitive radio networks., , , , and . J. Netw. Comput. Appl., (2020)Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities., , , , and . J. Parallel Distributed Comput., (2019)