Author of the publication

Placement optimization of IoT security solutions for edge computing based on graph theory.

, , , , and . IPCCC, page 1-7. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enumerative encoding of correlation immune Boolean functions., , and . ITW, page 643-647. IEEE, (2011)Placement optimization of IoT security solutions for edge computing based on graph theory., , , , and . IPCCC, page 1-7. IEEE, (2019)The 0-1 law fails for frame satisfiability of propositional modal logic.. LICS, page 225-234. IEEE Computer Society, (2002)In What Way Is It Possible to Impersonate You Bypassing Fingerprint Sensors?, , , and . BIOSIG, volume P-260 of LNI, page 377-384. GI / IEEE, (2016)Classification des fonctions booléennes pour la corrélation d'ordre 1, and . C2 - Journées Codages et Cryptographie, Aussois, France, (January 2005)Equivalence classes of boolean functions for first-order correlation., and . ISIT, page 181-185. IEEE, (2007)Quelques études de l'aléatoire en informatique.. (2016)EvaBio a New Modular Platform to Evaluate Biometric System., , , , , and . ICISSP (Revised Selected Papers), volume 576 of Communications in Computer and Information Science, page 234-250. Springer, (2015)A semantic approach for comparing Fog Service Placement Problems., , , , and . IM, page 682-686. IEEE, (2021)Performance of Password Guessing Enumerators Under Cracking Conditions., , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 67-80. Springer, (2019)