Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Foreword by Guest Editors for the Special Issue on the 2013 ICUFN Conference., , and . Wireless Personal Communications, 78 (4): 1827-1831 (2014)Secure Framework for Voice Transmission over Multipath Wireless Ad-Hoc Network., , and . GLOBECOM, page 1-6. IEEE, (2009)Electromagnetic characterization of SNR variation in passive Gen2 RFID system., , , , and . ICUFN, page 172-175. IEEE, (2017)Performance evaluation of an enhanced cryptography solution for m-Health applications in cooperative environments., , , and . GLOBECOM, page 1711-1716. IEEE, (2013)Relay power allocation in auction-based game approach., , , and . GLOBECOM, page 1812-1817. IEEE, (2012)Breast Alert: An On-line Tool for Predicting the Lifetime Risk of Women Breast Cancer., , , and . J. Medical Systems, 36 (3): 1417-1424 (2012)A Fan-Based Smart Selective Trap for Flying Insects., , , , , and . LATINCOM, page 1-5. IEEE, (2018)Trust assistance in Sensor-Cloud., , , , , and . INFOCOM Workshops, page 342-347. IEEE, (2015)A New Energy Prediction Approach for Intrusion Detection in Cluster-Based Wireless Sensor Networks., , , , and . GreeNets, volume 51 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-12. Springer, (2011)A cross-layer sleep and rate adaptation mechanism for slotted ALOHA wireless sensor networks., , and . ICTC, page 213-217. IEEE, (2010)