Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of a Split-Layer Multicast Mechanism with H.26L Video Coding Scheme., , and . ICETE (3), page 181-186. INSTICC Press, (2004)A New Word-Intersection Clustering Method for Information Filtering., , and . ICETE (1), page 241-244. INSTICC Press, (2004)Internet Security: Public-Key Infrastractures and Certification Systems., and . ICETE (2), page 93-106. INSTICC Press, (2004)A Cloud-Based Architecture for Interactive E-Training., , , and . Int. J. Knowl. Soc. Res., 8 (1): 67-78 (2017)IiCE: A Proposed System Based on IoTaaS to Study Administrative Efficiency in Primary Schools., , and . IoTaaS, volume 421 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 121-138. Springer, (2021)A Comprehensive Study on the Energy Efficiency of IoT from Four Angles: Clustering and Routing in WSNs, Smart Grid, Fog Computing and MQTT & CoAP Application Protocols., , and . IoTaaS, volume 421 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 54-70. Springer, (2021)A Proposed Secure TCP Connection-oriented Model for E-Commerce Systems., and . IMSA, page 68-73. IASTED/ACTA Press, (2002)Multimedia Multicast Using SPLIT and Layered FEC., and . ICITA (2), page 393-396. IEEE Computer Society, (2005)A Critical Analysis of Multilayer IP Security Protocol., and . ICITA (2), page 683-688. IEEE Computer Society, (2005)Risk in Trusted Decentralized Communications., , , , and . ICDE Workshops, page 1198. IEEE Computer Society, (2005)