Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable Star-Topology Server-Array Based P2P Overlay Network Testbed., , and . TRIDENTCOM, volume 90 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 172-179. Springer, (2011)Pervasive emotion computing: Conceptualization and implementation on emotion-aware digital movie guide service., , and . CCECE, page 767-772. IEEE, (2011)Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 2783-2803 (September 2023)Lightweight Dew Computing Paradigm to Manage Heterogeneous Wireless Sensor Networks with UAVs., , , , , and . CoRR, (2018)Secure hierarchical Virtual Private LAN Services for provider provisioned networks., , and . CNS, page 233-241. IEEE, (2013)Secure Virtual Private LAN Services: An overview with performance evaluation., , , and . ICC Workshops, page 2231-2237. IEEE, (2015)ADHT: Agent-based DHT architecture for constrained devices., , , and . GLOBECOM, page 2763-2769. IEEE, (2014)Energy consumption model for mobile devices in 3G and WLAN networks., , and . CCNC, page 532-537. IEEE, (2012)Secure Keying Scheme for Network Slicing in 5G Architecture., , , , and . CSCN, page 1-6. IEEE, (2019)Leveraging LTE security with SDN and NFV., , , , , and . ICIIS, page 220-225. IEEE, (2015)