Author of the publication

Extending Trust in Peer-to-Peer Networks.

, , and . ADBIS (Workshops), volume 5968 of Lecture Notes in Computer Science, page 145-152. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An evaluation of break-the-glass access control model for medical data in wireless sensor networks., , , and . Healthcom, page 130-135. IEEE, (2014)A quantitative analysis of TCP performance over wireless multihop networks., , , and . VTC Fall, page 610-614. IEEE, (2001)On service prioritization in mobile ad-hoc networks., , , and . ICC, page 1900-1904. IEEE, (2001)A Multi-factor Authentication Method for Security of Online Examinations., , and . SGIoT, volume 256 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 131-138. Springer, (2018)Graphical and text based challenge questions for secure and usable authentication in online examinations., , , and . ICITST, page 302-308. IEEE, (2014)A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack., , , , and . IAS, page 50-55. IEEE Computer Society, (2007)A Dynamic Game with Adaptive Strategies for IEEE 802.15.4 and IoT., , and . Trustcom/BigDataSE/ISPA, page 473-480. IEEE, (2016)Analysis of Student Preference to Group Work Assessment in Cybersecurity Courses., , and . CSE4IA@AVI, volume 3700 of CEUR Workshop Proceedings, CEUR-WS.org, (2024)Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain., , , and . Comput. Networks, (2022)The Use of Visual and Auditory Feedback for Assembly Task Performance in a Virtual Environment., , , and . IV, page 779-784. IEEE Computer Society, (2005)