Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of a Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the RBAC Model., , , , and . EIDWT, volume 29 of Lecture Notes on Data Engineering and Communications Technologies, page 80-91. Springer, (2019)An Energy-Based Algorithm for Detecting Implicitly Faulty Replicas of a Process., , , , and . CISIS, volume 1194 of Advances in Intelligent Systems and Computing, page 288-299. Springer, (2020)An Opportunistic Communication Protocol to Reduce Energy Consumption of Nodes., , , , and . NBiS, volume 1264 of Advances in Intelligent Systems and Computing, page 320-326. Springer, (2020)The Group-Based Linear Time Causally Ordering Protocol in a Scalable P2PPS System., , , and . BWCCA, volume 97 of Lecture Notes in Networks and Systems, page 471-482. Springer, (2019)A Nodes Selection Algorithm for Fault Recovery in the GTBFC Model., , , and . BWCCA, volume 97 of Lecture Notes in Networks and Systems, page 81-92. Springer, (2019)Algorithm for Detecting Implicitly Faulty Replicas Based on the Power Consumption Model., , , , and . BWCCA, volume 97 of Lecture Notes in Networks and Systems, page 483-493. Springer, (2019)Data Exchange Algorithm at Aggregate Level in the TWTBFC Model., , , , and . BWCCA, volume 97 of Lecture Notes in Networks and Systems, page 114-124. Springer, (2019)Multi-source and Multi-target Node Selection in Energy-Efficient Fog Computing Model., , , , , and . BWCCA, volume 159 of Lecture Notes in Networks and Systems, page 22-33. Springer, (2020)Synchronization Protocols to Prevent Illegal Information Flow in Role-Based Access Control Systems., , , , and . CISIS, page 279-286. IEEE Computer Society, (2014)A Flexible Read-Write Abortion Protocol to Prevent Illegal Information Flow among Objects., , , and . J. Mobile Multimedia, 11 (3&4): 263-280 (2015)