Author of the publication

Modeling Context-Adaptive Energy-Aware Security in Mobile Devices.

, , , and . LCN Workshops, page 105-109. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive multifoveation for low-complexity video compression with a stationary camera perspective., , and . Electronic Imaging: Image and Video Communications and Processing, volume 5685 of SPIE Proceedings, SPIE, (2005)Towards policy-driven power management for cloud computing., and . ANTS, page 1-5. IEEE, (2017)Context-sec: Balancing Energy Consumption and Security of Mobile Devices., , , , and . IGSC, page 1-6. IEEE, (2018)Energy and Performance Comparison of Cryptocurrency Mining for Embedded Devices., , and . ISED, page 1-5. IEEE, (2019)Energy modeling for mobile devices using performance counters., and . MWSCAS, page 441-444. IEEE, (2013)Modelling the Impact of Code Obfuscation on Energy Usage., , and . DIAS/EDUDM@ISEC, volume 1819 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Towards a Lightweight Blockchain Platform for Critical Infrastructure Protection., , and . ICDCS, page 1287-1292. IEEE, (2020)A SMART Goal-based Framework for Privacy Preserving Embedded Forensic Investigations., , and . ISED, page 1-5. IEEE, (2019)A novel lightweight PUF based authentication protocol for IoT without explicit CRPs in verifier database., , and . J. Ambient Intell. Humaniz. Comput., 14 (5): 6227-6242 (2023)The Lam/Mpi Checkpoint/Restart Framework: System-Initiated Checkpointing., , , , , , , and . Int. J. High Perform. Comput. Appl., 19 (4): 479-493 (2005)