Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Future and Challenges of the Security of e-Systems and Computer Networks.. SECRYPT, page 15-16. INSTICC Press, (2007)Secure Grid-Based Multi-Party Micropayment System in 4G Networks., , and . ICE-B, page 137-148. INSTICC Press, (2007)Design Alternatives for Virtual Private Networks., , , and . EGCDMAS, page 35-45. INSTICC Press, (2004)Fundamentals of Wireless Network Systems.. ICETE (Invited Speakers), page 23-24. INSTICC Press, (2004)Improved Secure Neighbor Discovery Protocol (ISEND) for New Wireless Networks Generations., , , , and . WINSYS, page 71-77. SciTePress, (2014)HIP_IKEv2: A Proposal to Improve Internet Key Exchange Protocol-based on Host Identity Protocol., , , , and . SIMULTECH, page 404-411. SciTePress, (2013)A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments., , , , and . ICETE (1), page 462-468. SciTePress, (2018)HITH: Hybrid IP Traceback for Heterogeneous Wireless Networks., , , , and . WINSYS, page 84-93. SciTePress, (2016)Performance of the short-time Fourier Transform and Wavelet Transform to phonocardiogram signal analysis., and . SAC, page 856-862. ACM, (1992)Performance comparison of neural networks and pattern recognition techniques for classifying ultrasonic transducers., and . SAC, page 1234-1242. ACM, (1992)