Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security in Ad Hoc Networks: From Vulnerability to Risk Management., , and . SECURWARE, page 203-209. IEEE Computer Society, (2009)An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks., , and . ICNSC, page 366-371. IEEE, (2010)Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme., , , and . ARES, page 636-641. IEEE Computer Society, (2008)A Survey on Trust and Reputation Schemes in Ad Hoc Networks., , , and . ARES, page 881-886. IEEE Computer Society, (2008)Lifetime Optimization in Hierarchical Wireless Sensor Networks., , , and . ETFA, page 1-8. IEEE, (2009)Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges., , and . ICSNC, page 5. IEEE Computer Society, (2007)Cooperative Defense Firewall Protocol., and . SEC, volume 250 of IFIP Conference Proceedings, page 373-384. Kluwer, (2003)Coarse spectrum sensing for LTE systems., , , and . ICT, page 116-121. IEEE, (2010)Interference Mitigation in D2D Communications for 5G Mobile Networks., , , , and . ECAI, page 1-6. IEEE, (2021)Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges., , and . ICSNC, page 17. IEEE Computer Society, (2007)