Author of the publication

A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment.

, , , , and . UIC, volume 5061 of Lecture Notes in Computer Science, page 35-45. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparative Study of Wireless Sensor Networks and Their Routing Protocols., , and . Sensors, 10 (12): 10506-10523 (2010)Clustering and Flow Conservation Monitoring Tool for Software Defined Networks., , and . Sensors, 18 (4): 1079 (2018)Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks., , , , and . Sensors, 16 (11): 1832 (2016)A New Authentication Scheme for Cloud-based Storage Applications., , and . SIN, page 57-60. ACM, (2016)At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid., , , and . IWCMC, page 1067-1072. IEEE, (2019)A novel Approach for Privacy-Preserving Data Aggregation in Smart Grid., , , and . IWCMC, page 1060-1066. IEEE, (2019)A novel adaptive streaming approach for cloud-based mobile video games., , and . IWCMC, page 1072-1077. IEEE, (2017)A novel privacy technique for Augmented Reality cloud gaming based on image authentication., , and . IWCMC, page 252-257. IEEE, (2017)A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks., , and . IWCMC, page 1193-1198. IEEE, (2015)Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks., , , and . IJDSN, (2012)