From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Toward Ciphertext Policy Attribute Based Encryption Model: A Revocable Access Control Solution in Cloud Computing., , и . CRiSIS, том 12026 из Lecture Notes in Computer Science, стр. 193-207. Springer, (2019)FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloud., , , и . Clust. Comput., 24 (3): 1945-1954 (2021)HealthGlasses Project: WBAN Based Communication for Health Monitoring Through Smart Glasses., и . ISNCC, стр. 1-6. IEEE, (2023)Performance Evaluation of the Circulating Multisequencer and the Consensus Algorithms in a Real-Time Distributed Transactional System., и . SRDS, стр. 302-303. IEEE Computer Society, (1999)Impact of IEEE 802.11 PHY/MAC Strategies on Routing Performance in Wireless Mesh Networks., , , , и . AINA Workshops, стр. 803-808. IEEE Computer Society, (2013)A Novel QoS-Aware Method Based on Resource Control and Management in NGN Networks., и . PDP, стр. 288-291. IEEE Computer Society, (2014)Performance Evaluation of Deadline Monotonic Policy over 802.11 Throughput and Average Service Time., и . ICN, стр. 415-420. IEEE Computer Society, (2008)A comparative study for real time scheduling., и . ICECS, стр. 530-533. IEEE, (2007)Medium access control in VANET., и . COMNET, стр. 1-6. IEEE, (2017)A Distributed Unselfish Spectrum Assignment for Smart Microgrid Cognitive Wireless Sensor Networks., , , и . WCNC, стр. 1-6. IEEE, (2017)