Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QoS Path Selection Exploiting Minimum Link Delays in MPLS-Based Networks., , and . Systems Communications, page 27-32. IEEE Computer Society, (2005)Securing Internet of Things with Software Defined Networking., and . IEEE Communications Magazine, 56 (9): 186-192 (2018)Online deception in social media., and . Commun. ACM, 57 (9): 72-80 (2014)Analysis of Security Protocols for Mobile Healthcare., , , and . J. Medical Systems, 40 (11): 229:1-229:10 (2016)Dynamic pricing for load-balancing in user-centric joint call admission control of next-generation wireless networks., , and . Int. J. Commun. Syst., 23 (3): 335-368 (2010)Securing Internet of Things (IoT) with machine learning., and . Int. J. Commun. Syst., (2020)Design, implementation, and performance analysis of a secure payment protocol in a payment gateway centric model., and . Computing, 96 (7): 587-611 (2014)Internet Protocol Television (IPTV): Architecture, Trends, and Challenges., , and . IEEE Syst. J., 5 (4): 518-527 (2011)Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud., , , and . IEEE Netw., 29 (2): 62-69 (2015)ElectroBlocks: A blockchain-based energy trading scheme for smart grid systems., , , and . Int. J. Commun. Syst., (2020)