Author of the publication

An Efficient GDPR-Compliant Data Management for IoHT Applications.

, , , and . ICC Workshops, page 1950-1955. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithmic state machine implementation with hybrid microprocessing/microprogramming scheme., and . MICRO, page 54-67. ACM/IEEE, (1986)Adaptive Slot Allocation to Control Queuing Delay in TDMA Wireless Base Station., , , and . J. Inf. Sci. Eng., 20 (5): 845-868 (2004)A Few-Shot Learning Method Using Feature Reparameterization and Dual-Distance Metric Learning for Object Re-Identification., , , and . IEEE Access, (2021)MORR: A Novel Regional Location Management Scheme Based on User Movement Behavior in Mobile IP., , and . IEICE Trans. Inf. Syst., 89-D (2): 487-497 (2006)A Hierarchical Blockchain-based Data Service Platform in MEC Environments., , , , , and . ICBCT, page 95-99. ACM, (2020)Learning Decision Functions in Fuzzy g-Models., and . Int. J. Artif. Intell. Tools, 9 (4): 459-471 (2000)A geo-temporal mobility prediction method for cooperative time-validity-constrained content delivery in opportunistic networks., and . Comput. Networks, (2018)An opportunistic resource allocation approach for mixed QoS and non-QoS connections in OFDMA wireless networks., , , and . Comput. Networks, 57 (13): 2615-2627 (2013)Packet Length Adaptation for Energy-Proportional Routing in Clustered Sensor Networks., , , , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 32-42. Springer, (2006)The new intrusion prevention and detection approaches for clustering-based sensor networks wireless sensor networks., , , and . WCNC, page 1927-1932. IEEE, (2005)