Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New 3/2-Approximation Algorithm for the b-Edge Cover Problem., and . CSC, page 52-61. SIAM, (2016)Scalable Approaches to Selecting Key Entities in Large Networked Infrastructure Systems., and . IEEE BigData, page 1731-1738. IEEE, (2021)A novel approach to maximize the sum-rate for MIMO broadcast channels., , and . SNPD, page 155-159. IEEE Computer Society, (2015)Lightweight Cryptanalysis of IoT Encryption Algorithms : Is Quota Sampling the Answer?, , and . CoRR, (2024)RSSI Estimation for Constrained Indoor Wireless Networks using ANN., , and . CoRR, (2024)Next Generation Cloud Computing: Security, Privacy and Trust Issues from the System View., and . JCSSE, page 1-6. IEEE, (2021)Exploring Secure Communication in VANET Broadcasting., , , and . ATCS/SePrIoT@SecureComm, volume 239 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 69-84. Springer, (2017)Intelligent Task Off-Loading and Resource Allocation for 6G Smart City Environment., , and . LCN, page 441-444. IEEE, (2020)Fog Computing in 5G Enabled Smart Cities: Conceptual Framework, Overview and Challenges.. ISC2, page 438-443. IEEE, (2019)Fault-Localization Protocol for Wireless Sensor Networks., , and . LCN Symposium, page 42-49. IEEE, (2019)