Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks., , and . Wirel. Pers. Commun., 29 (3-4): 303-321 (2004)Delivering Attribute Certificates over GPRS., , and . SAC, page 1166-1170. ACM, (2004)Optimized Cloudlet Management in Edge Computing Environment., and . CAMAD, page 1-6. IEEE, (2018)Energy-efficient virtual machine provisioning mechanism in cloud computing environments., , and . Panhellenic Conference on Informatics, page 197-202. ACM, (2015)Energy-aware Management of Virtual Machines in Cloud Data Centers., , and . EANN Workshops, page 35:1-35:6. ACM, (2015)Introducing PKI to Enhance Security in Future Mobile Networks., , and . SEC, volume 250 of IFIP Conference Proceedings, page 109-120. Kluwer, (2003)Energy-efficient traffic bypassing in LTE HetNets with mobile relays., , and . WiMob, page 316-321. IEEE Computer Society, (2015)Workload Prediction for Efficient Node Management in Mobile Edge Computing., , , , and . IFIP Networking, page 461-467. IEEE, (2024)Energy efficient wireless in-band backhaul in heterogeneous networking environments., and . SoftCOM, page 1-6. IEEE, (2016)Selection of Service Nodes in Edge Computing Environments., and . IoTSMS, page 1-6. IEEE, (2020)