Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic Engineering Using Segment Routing and Considering Requirements of a Carrier IP Network., , , , and . IEEE/ACM Trans. Netw., 26 (4): 1851-1864 (2018)Message from the general chair.. LCN Workshops, page 1. IEEE Computer Society, (2015)Identification of contamination zones for sinkhole detection in MANETs., , , and . J. Netw. Comput. Appl., (2015)On modeling and impact of geographic restrictions for human mobility in opportunistic networks., and . Perform. Evaluation, (2019)Changing Trends in Modeling Mobility., , and . J. Electr. Comput. Eng., (2012)Deploying a mesh-based command and control sensing system in a disaster area maneuver., , , , and . SenSys, page 335-336. ACM, (2011)Towards securing Public-Key Storage using Hyperledger Fabric., , and . ICBC, page 1-3. IEEE, (2022)Decentralizing loT Public- Key Storage using Distributed Ledger Technology., , and . IWCMC, page 172-177. IEEE, (2022)WIP: Real-world 3D models derived from mobile mapping for ray launching based propagation loss modeling., , , , , , and . WoWMoM, page 161-164. IEEE, (2022)Adjustable security for RFID-equipped IoT devices., , , , and . RFID-TA, page 208-213. IEEE, (2017)