From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A hole detection scheme based on polygonal cycles for the irregular radio range in WSN., , и . MOBIWAC, стр. 31-38. ACM, (2014)Location Management in Wireless Fourth Generation Networks., , и . GLOBECOM, стр. 4984-4988. IEEE, (2007)DigForNet: Digital Forensic in Networking., , и . SEC, том 278 из IFIP, стр. 637-651. Springer, (2008)Intrusion tolerant QoS provision in mobile multihop relay networks., и . EURASIP J. Wireless Comm. and Networking, (2013)An Agreement Graph-Based-Authentication Scheme for 5G Networks., и . UNet, том 10542 из Lecture Notes in Computer Science, стр. 509-520. Springer, (2017)A location-aware authentication and key management scheme for wireless sensor networks., и . APCC, стр. 488-495. IEEE, (2016)A Temporal Logic-Based Model for Forensic Investigation in Networked System Security., и . MMM-ACNS, том 3685 из Lecture Notes in Computer Science, стр. 325-338. Springer, (2005)A new tracking-aware gossiping scheme for Wireless Sensor Networks., , и . WCNIS, стр. 349-354. IEEE, (2010)Secure and QoS-aware SIP handover for VoIP communication in vehicular adhoc networks., , и . IWCMC, стр. 695-700. IEEE, (2011)Access control in 5G communication networks using simple PKI certificates., , и . IWCMC, стр. 2092-2097. IEEE, (2017)