Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On modeling and impact of geographic restrictions for human mobility in opportunistic networks., and . Perform. Evaluation, (2019)Identification of contamination zones for sinkhole detection in MANETs., , , and . J. Netw. Comput. Appl., (2015)Changing Trends in Modeling Mobility., , and . J. Electr. Comput. Eng., (2012)Message from the general chair.. LCN Workshops, page 1. IEEE Computer Society, (2015)Traffic Engineering Using Segment Routing and Considering Requirements of a Carrier IP Network., , , , and . IEEE/ACM Trans. Netw., 26 (4): 1851-1864 (2018)Decentralizing loT Public- Key Storage using Distributed Ledger Technology., , and . IWCMC, page 172-177. IEEE, (2022)WIP: Real-world 3D models derived from mobile mapping for ray launching based propagation loss modeling., , , , , , and . WoWMoM, page 161-164. IEEE, (2022)Towards securing Public-Key Storage using Hyperledger Fabric., , and . ICBC, page 1-3. IEEE, (2022)Deploying a mesh-based command and control sensing system in a disaster area maneuver., , , , and . SenSys, page 335-336. ACM, (2011)Enhancing privacy for passive UHF RFID using an SDR-based reactive jammer., , and . RFID-TA, page 202-207. IEEE, (2017)