Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Entropy attacks and countermeasures in wireless network coding., , and . WISEC, page 185-196. ACM, (2012)Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol., , , , and . ESAS, volume 4357 of Lecture Notes in Computer Science, page 98-112. Springer, (2006)Alien vs. Mobile user game: Fast and efficient area coverage in crowdsensing., , and . MobiCASE, page 65-74. IEEE, (2014)On the Survivability of Routing Protocols in Ad Hoc Wireless Networks., , , , and . SecureComm, page 327-338. IEEE, (2005)Robust dynamic remote data checking for public clouds., and . CCS, page 1043-1045. ACM, (2012)Multi-destination vehicular route planning with parking and traffic constraints., , , , and . MobiQuitous, page 298-307. ACM, (2019)Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems., , and . CODASPY, page 281-288. ACM, (2015)Indexing multimedia learning materials in ultimate course search., , , , , and . CBMI, page 1-6. IEEE, (2016)Collaborative Bluetooth-based location authentication on smart phones., , and . Pervasive Mob. Comput., (2015)Bootstrapping Trust in Community Repository Projects., , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 450-469. Springer, (2022)