Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks., , , , and . FGIT-FGCN, volume 56 of Communications in Computer and Information Science, page 405-412. Springer, (2009)Password typos resilience in honey encryption., , and . ICOIN, page 593-598. IEEE, (2017)Design and QoS of a Wireless System for Real-Time Remote Electrocardiography., , , and . IEEE J. Biomed. Health Informatics, 17 (3): 745-755 (2013)A reliable adaptive forwarding approach in named data networking., , , , and . Future Gener. Comput. Syst., (2019)Analysis of NTP pool monitoring system based on multiple monitoring stations., , and . MobiHoc, page 259-264. ACM, (2022)Secure Device-to-Device Authentication in Mobile Multi-hop Networks., , , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 267-278. Springer, (2014)A Comparative Analysis of Searchable Encryption Schemes using SGX., and . ICTC, page 526-528. IEEE, (2020)A Survey on Security Threats in Blockchain-based Internet of Things Systems., and . ICTC, page 2134-2138. IEEE, (2022)Downgrading Backward Privacy of Searchable Encryption., , , , and . ICOIN, page 324-328. IEEE, (2022)Fully-distributed multicast routing protocol for IEEE 802.15.8 peer-aware communications., , , , , , , , and . ICOIN, page 64-69. IEEE Computer Society, (2014)