Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SEMAN: A Novel Secure Middleware for Mobile Ad Hoc Networks., and . J. Comput. Networks Commun., (2016)Reducing Hadoop 3.x energy consumption through Energy Efficient Ethernet., , and . BigComp, page 9-14. IEEE, (2022)Applying Load Balance to Reduce the Energy Consumption of the Virtual Routing Protocol., and . WINSYS, page 32-37. INSTICC Press, (2009)Towards a User Identification Framework for Mobile Devices., and . CCNC, page 272-276. IEEE, (2008)TruMan: Trust Management for Vehicular Networks., and . ISCC, page 801-806. IEEE, (2018)Trace-Driven Extension for Noxim Simulator., , and . SBESC, page 102-108. IEEE Computer Society, (2017)Distributed Self-organized Trust Management for Mobile Ad Hoc Networks., , and . NDT (1), volume 293 of Communications in Computer and Information Science, page 506-518. Springer, (2012)Reliable routing in wireless ad hoc networks.. University of Pisa, Italy, (2004)Resisting to False Identities Attacks to the Public-Key Management System for Wireless Ad Hoc Networks., , and . MONAMI, volume 97 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 344-357. Springer, (2011)Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on Manets., , , and . SECRYPT, page 128-135. INSTICC Press, (2008)