Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PryGuard: A Secure Distributed Authentication Protocol for Pervasive Computing Environment., , , , and . IEA/AIE (1), volume 6703 of Lecture Notes in Computer Science, page 135-145. Springer, (2011)Towards developing a trust-based security solution., , , and . SAC, page 2204-2205. ACM, (2009)An Approach for Ensuring Robust Safeguard against Location Privacy Violation., and . COMPSAC, page 82-91. IEEE Computer Society, (2010)ePet: when cellular phone learns to recognize its owner., , , and . SafeConfig, page 13-18. ACM, (2009)A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services., , and . COMPSAC (1), page 1-10. IEEE Computer Society, (2009)ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems., , and . COMPSAC (1), page 11-20. IEEE Computer Society, (2009)Towards Universal Access to Home Monitoring for Assisted Living Environment., , , and . HCI (6), volume 5615 of Lecture Notes in Computer Science, page 189-198. Springer, (2009)Self-healing for Autonomic Pervasive Computing., , , and . Autonomic Communication, Springer, (2010)Towards TTP-free lightweight solution for location privacy using location-based anonymity prediction., , , and . RACS, page 293-297. ACM, (2011)Home-Healthcare-Network (H2N): An Autonomous Care-Giving System for Elderly People., , , and . USAB, volume 7058 of Lecture Notes in Computer Science, page 245-262. Springer, (2011)