Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks., and . Int. J. Inf. Sec., 6 (6): 379-392 (2007)Generic uneven level protection algorithm for multimedia data transmission over packet-switched networks., , , , , , and . ICCCN, page 340-346. IEEE, (2001)Permission-free Keylogging through Touch Events Eavesdropping on Mobile Devices., , and . PerCom Workshops, page 28-33. IEEE, (2019)Special section on wireless network behaviour and design., and . Comput. Commun., 35 (18): 2173-2174 (2012)Special Issue on: 'Resources and mobility management in wireless networks'., and . Wirel. Commun. Mob. Comput., 8 (3): 277-278 (2008)Special issue on "quality of service and security in wireless and mobile networks"., and . Wirel. Commun. Mob. Comput., 10 (5): 593-595 (2010)Next generation IEEE 802.11 Wireless Local Area Networks: Current status, future directions and open challenges., , , and . CoRR, (2021)A differentiated distributed coordination function MAC protocol for cluster-based wireless ad hoc networks., , , , , and . PE-WASUN, page 77-86. ACM, (2004)Future channel reservation medium access control (FCR-MAC) protocol for multi-radio multi-channel wireless mesh networks., , and . PE-WASUN, page 71-79. ACM, (2008)The Emergency Direct Mobile App: Safety Message Dissemination over a Multi-Group Network of Smartphones using Wi-Fi Direct., , and . MobiWac, page 99-106. ACM, (2016)