Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel distributed algorithm for redundant reader elimination in RFID networks., , and . RFID-TA, page 1-6. IEEE, (2013)Modeling of pollution in p2p file sharing systems., , , , and . CCNC, page 1033-1037. IEEE, (2006)Incrementally Updateable Honey Password Vaults., , , , and . USENIX Security Symposium, page 857-874. USENIX Association, (2021)RFID Privacy Concerns: A Conceptual Analysis in the Healthcare Sector., , and . AMCIS, page 253. Association for Information Systems, (2009)In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems., , , , , , and . SUTC (1), page 252-259. IEEE Computer Society, (2006)User-driven cloud transportation system for smart driving., , , and . CloudCom, page 658-665. IEEE Computer Society, (2012)A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping., , , and . INFOCOM, page 2820-2828. IEEE, (2010)Model Based Energy Consumption Analysis of Wireless Cyber Physical Systems., , , and . BigDataSecurity/HPSC/IDS, page 219-224. IEEE, (2017)Genetic algorithms for integrating cell formation with machine layout and scheduling., , , and . Comput. Ind. Eng., 53 (2): 277-289 (2007)Detection of Atrial Fibrillation from Short ECG Signals Using a Hybrid Deep Learning Model., , , and . ICSH, volume 11924 of Lecture Notes in Computer Science, page 269-282. Springer, (2019)