Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution., and . J. Supercomput., 74 (10): 4928-4944 (2018)Adaptive Anonymous Authentication for Wearable Sensors in Wireless Body Area Networks., , , , and . IWCMC, page 606-611. IEEE, (2018)A stochastic game for adaptive security in constrained wireless body area networks., , , , and . CCNC, page 1-7. IEEE, (2018)Implementing an emerging mobility model for a fleet of UAVs based on a fuzzy logic inference system., , and . Pervasive Mob. Comput., (2017)A Secure and Interoperable Platform for Privacy Protection in the Smart Hotel Context., , , , , , , , and . GIIS, page 1-6. IEEE, (2020)Cooperation in 4G - Hype or Ripe?, , , and . IEEE Technol. Soc. Mag., 27 (1): 13-17 (2008)Computation offloading game for an UAV network in mobile edge computing., , , and . ICC, page 1-6. IEEE, (2017)A lightweight hybrid security framework for wireless sensor networks., and . ICC, page 3636-3641. IEEE, (2014)An Infrastructure-Free Traffic Information System for Vehicular Networks., , , and . VTC Fall, page 2086-2090. IEEE, (2007)Vertical Handover Decision Algorithm for Multimedia Streaming in VANET., , and . Wireless Personal Communications, 95 (4): 4281-4299 (2017)