Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A unified hybrid information-centric naming scheme for IoT applications., , , , and . Comput. Commun., (2020)PGAS: Privacy-preserving graph encryption for accurate constrained shortest distance queries., , , , , and . Inf. Sci., (2020)Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks., , , and . CCNC, page 1-5. IEEE, (2009)Explicit Congestion Notification-Based Congestion Control Algorithm for High-Performing Data Centers., , , and . AFRICON, page 1-6. IEEE, (2023)3P Framework: Customizable Permission Architecture for Mobile Applications., , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 445-456. Springer, (2017)Disease Prediction in Edge Computing: A Privacy-Preserving Technique for PHI Collection and Analysis., , , , , , and . IEEE Netw., 36 (6): 6-11 (2022)Anycast Based Lightweight Routing Protocol for Mobile Sink Discovery in Sensor Networks., , and . CCNC, page 1-2. IEEE, (2010)A Distributed ICN-Based IoT Network Architecture: An Ambient Assisted Living Application Case Study., , , and . GLOBECOM, page 1-6. IEEE, (2017)Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data., , , , , and . IEEE Trans. Big Data, 9 (3): 805-817 (June 2023)When User Interest Meets Data Quality: A Novel User Filter Scheme for Mobile Crowd Sensing., , , and . ICPADS, page 97-104. IEEE Computer Society, (2017)