Author of the publication

Security Challenges in Vehicular Cloud Computing.

, , , and . IEEE Trans. Intell. Transp. Syst., 14 (1): 284-294 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of 802.11e EDCA on mixed TCP-based applications., and . WICON, page 26. ACM, (2006)Toward aggregating time-discounted information., , and . MiSeNet@MobiCom, page 57-66. ACM, (2013)p-IVG: Probabilistic Inter-Vehicle Geocast for Dense Vehicular Networks., , and . VTC Spring, IEEE, (2009)Accurate data aggregation for VANETs., and . Vehicular Ad Hoc Networks, page 71-72. ACM, (2007)Performance of Competing High-Speed TCP Flows., , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 476-487. Springer, (2006)Characteristics of Social Media Stories., , and . TPDL, volume 9316 of Lecture Notes in Computer Science, page 267-279. Springer, (2015)Providing VANET security through active position detection., , and . Comput. Commun., 31 (12): 2883-2897 (2008)Mobile Mink: Merging Mobile and Desktop Archived Webs., , , , , and . JCDL, page 243-244. ACM, (2015)Detecting off-topic pages within TimeMaps in Web archives., , and . Int. J. Digit. Libr., 17 (3): 203-221 (2016)Not all mementos are created equal: measuring the impact of missing resources., , , , and . Int. J. Digit. Libr., 16 (3-4): 283-301 (2015)