Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity Based Key Distribution Framework for Link Layer Security of AMI Networks., , , and . IEEE Trans. Smart Grid, 9 (4): 3166-3179 (2018)Automated device for determination of skin lesion regions., , , and . SAC, page 859-860. ACM, (2009)EmuNET: a real-time network emulator., and . SAC, page 357-362. ACM, (2004)On cellular network planning and operation with M2M signalling and security considerations., , , and . ICC Workshops, page 429-434. IEEE, (2014)PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems., , , and . ATC, volume 4158 of Lecture Notes in Computer Science, page 205-216. Springer, (2006)A resource reservation attack against LTE networks., , , and . ICCIT, page 262-268. IEEE, (2013)Proactive channel allocation for multimedia applications over CSMA/CA-based CRNs., , , , and . ACTEA, page 178-183. IEEE, (2016)A design methodology for energy aware neural networks., , , , , and . IWCMC, page 1333-1340. IEEE, (2011)An enterprise policy-based security protocol for protecting relational database network objects., , and . IWCMC, page 343-348. ACM, (2006)Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices., , and . SecureComm, page 240-242. IEEE, (2005)