Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating voltage fingerprint spoofing attacks on the controller area network bus., , and . Clust. Comput., 26 (2): 1447-1460 (April 2023)Dynamic Application Call Graph Formation and Service Identification in Cloud Data Centers., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (1): 261-275 (March 2023)Humidity Estimation Using WiFi Channel State Information., and . LCN, page 1-4. IEEE, (2023)Underwater Node Localization using Optoacoustic Signals., , , and . ICC, page 4444-4449. IEEE, (2022)A Generalized Approach for the Control of MEM Relays., , and . ACC, page 3180-3185. IEEE, (2007)Distributed constraint satisfaction with multiply sectioned constraint networks., , and . IJIDS, 6 (2): 127-152 (2014)Collusion-resistant PUF-based Distributed Device Authentication Protocol for Internet of Things., , , and . GLOBECOM, page 4328-4333. IEEE, (2022)P-MAP: PUF-based Mutual Authentication Protocol., and . ICC, page 3424-3429. IEEE, (2022)Effective Mobile Charging Solution for Electric Vehciles in Smart Cities., and . ICITE, page 555-561. IEEE, (2022)From MANET to people-centric networking: milestones and open research challenges, , , , , , and . Computer Communications, (2015)