Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust secret key extraction from channel secondary random process., , , , , and . Wirel. Commun. Mob. Comput., 16 (11): 1389-1400 (2016)Secret Key Generation Based on AoA Estimation for Low SNR Conditions., , , , , and . VTC Spring, page 1-7. IEEE, (2015)Video acquisition between USB 2.0 CMOS camera and embedded FPGA system., , , , , , and . ICSPCS, page 1-5. IEEE, (2011)On the Secure Degrees of Freedom of the K-user MAC and 2-user Interference Channels., , and . CoRR, (2016)Distributed binary consensus algorithm and wireless sensor network., , and . IWCMC, page 1331-1336. IEEE, (2013)Impact of time synchronization error on the mode-shape identification and damage detection/localization in WSNs for structural health monitoring., , and . J. Netw. Comput. Appl., (2017)Distributed in-network processing and resource optimization over mobile-health systems., , , and . J. Netw. Comput. Appl., (2017)Exploiting spectrum sensing data for key management., , , , and . Comput. Commun., (2017)TOSSIM and distributed binary consensus algorithm in wireless sensor networks., and . J. Netw. Comput. Appl., (2014)The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications., , , , and . IEEE Trans. Control. Netw. Syst., 4 (4): 886-898 (2017)