Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gaussian Approximation-Based Lossless Compression of Smart Meter Readings., , and . IEEE Trans. Smart Grid, 9 (5): 5047-5056 (2018)Multi-Binomial mixes: A proposal for secure and efficient anonymous communication., and . Comput. Networks, (2015)Lightweight privacy preservation for secondary users in cognitive radio networks., , , , and . J. Netw. Comput. Appl., (2020)A Practical Privacy-Preserving Recommender System., , and . Data Sci. Eng., 1 (3): 161-177 (2016)Walsh-Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care., and . IEEE Trans. Biomed. Eng., 64 (9): 2186-2195 (2017)Fully peer-to-peer virtual environments with 3D Voronoi diagrams., and . Computing, 94 (8-10): 679-700 (2012)Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities., , , , and . J. Parallel Distributed Comput., (2019)An End-Systems Supported Highly Distributed Content Delivery Network., and . ICDCIT, volume 4882 of Lecture Notes in Computer Science, page 172-183. Springer, (2007)Secure Edge of Things for Smart Healthcare Surveillance Framework., , , and . IEEE Access, (2019)Turbo-coded HARQ scheme in multi-hop cooperative wireless networks., and . WMNC, page 1-4. IEEE, (2013)