Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QoS Constraints in Bluetooth-Based Wireless Sensor Networks., , , and . QofIS, volume 3266 of Lecture Notes in Computer Science, page 214-223. Springer, (2004)Analysis of IEEE802.11 DCF Parameters on Achievable Throughput in Ad hoc Networks., , , and . VTC Fall, IEEE, (2009)On the Performance of Enhanced Hierarchical Mobile IPv6., , , and . PIMRC, page 1575-1580. IEEE, (2005)Simulation Study on 2 Hop-Proportional Fair Scheduling and eICIC in Relay Type 1 Extended LTE-A Networks., , and . VTC Fall, page 1-5. IEEE, (2015)A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks., , , , and . J. Netw. Comput. Appl., 35 (2): 597-605 (2012)Security Protection on Trust Delegated Data in Public Mobile Networks., , and . eHealth, volume 27 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 200-207. Springer, (2009)Parameter Based Access Control Model for Mobile Handsets., , and . ISDF, volume 41 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 66-75. Springer, (2009)In-network Support for Packet Reordering for Multiaccess Transport Layer Tunneling., , , , , , and . PEMWN, page 1-6. IEEE, (2022)An energy efficient Clique-based CDS discovery protocol for wireless sensor networks., , , , , and . CISS, page 1-6. IEEE, (2010)XML Security based Access Control for Healthcare Information in Mobile Environment., , , and . PervasiveHealth, page 1-6. IEEE, (2006)