Author of the publication

Network Location Privacy Protection with Multi-access Edge Computing.

, , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 1342-1352. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Priority Based Wireless Communications for Health Monitoring on Highways., , and . J. Interconnect. Networks, 9 (4): 337-349 (2008)Adaptive Inter Vehicle Communications., , and . Int. J. Wirel. Inf. Networks, 13 (2): 151-160 (2006)Artificial intelligence control for trust-based detection of attackers in 5G social networks., , , and . Comput. Intell., (February 2024)Hierarchical Communications for Battlefields., , and . AINA Workshops (2), page 690-695. IEEE Computer Society, (2007)Routing through Backbone Structures in Sensor Networks., , , and . ICPADS (2), page 397-401. IEEE Computer Society, (2005)Wireless Communications for Health Monitoring on Highways., , and . ICDCS Workshops, page 37. IEEE Computer Society, (2007)Mobile Privacy Protection Enhanced with Multi-access Edge Computing., , and . AINA, page 724-731. IEEE Computer Society, (2018)Multi-access edge computing aided mobility for privacy protection in Internet of Things., , and . Computing, 101 (7): 729-742 (2019)Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring., , , , and . J. Ambient Intell. Humaniz. Comput., 10 (4): 1631-1640 (2019)Clustering Protocol for Sensor Networks., , , and . J. Interconnect. Networks, 7 (4): 423-436 (2006)