Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks., , , , , , and . Concurr. Comput. Pract. Exp., (2018)Corrigendum to "Private key agreement and secure communication for heterogeneous sensor networks" J. Parallel Distrib. Comput 70 (2010) 858-870., and . J. Parallel Distributed Comput., 70 (11): 1174 (2010)Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks., , , , and . IEEE Trans. Ind. Informatics, 14 (2): 799-813 (2018)Pairing-Based Secure Timing Synchronization for Heterogeneous Sensor Networks., , and . GLOBECOM, page 148-152. IEEE, (2008)Secure timing synchronization for heterogeneous sensor network using pairing over elliptic curve., , and . Wirel. Commun. Mob. Comput., 10 (5): 662-671 (2010)Privacy preserving secure data exchange in mobile P2P cloud healthcare environment., , , , , and . Peer-to-Peer Netw. Appl., 9 (5): 894-909 (2016)From sensing to alerting: a pathway of RESTstful messaging in ambient assisted living., , , , , and . IEEE Wirel. Commun., 23 (2): 102-110 (2016)Identity and Pairing-Based Secure Key Management Scheme for Heterogeneous Sensor Networks., , and . WiMob, page 423-428. IEEE Computer Society, (2008)Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems., , , , , and . IACR Cryptology ePrint Archive, (2010)Proposal and Evaluation of a Dynamic Resource Allocation Method Based on the Load of VMs on IaaS., , , , , , , and . NTMS, page 1-6. IEEE, (2011)