Author of the publication

P2PM-pay: Person to Person Mobile Payment Scheme Controlled by Expiration Date.

, , , and . Wireless Personal Communications, 85 (1): 289-304 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research Trends and Challenges for Network-Based ICT Systems., , , , and . Wirel. Pers. Commun., 85 (1): 1-7 (2015)Reliable and Secure e-Health Networks., , , , and . Wirel. Pers. Commun., 117 (1): 1-6 (2021)An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks., , , and . Sensors, 16 (4): 525 (2016)Toward Adaptive Data Aggregation Protocols in Wireless Sensor Networks., , , and . ICC 2016, page 73:1-73:6. ACM, (2016)Self-Similarity in Voice over Internet Traffic.. ICC 2016, page 2:1. ACM, (2016)Advances and Challenges in Convergent Communication Networks., , , , , , and . Wirel. Pers. Commun., 96 (4): 4919-4927 (2017)Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov models., , and . Math. Comput. Model., 57 (11-12): 2832-2845 (2013)Prediction of Speech Quality Based on Resilient Backpropagation Artificial Neural Network., , , , , , and . Wireless Personal Communications, 96 (4): 5375-5389 (2017)An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances., , , , , , and . Sensors, 19 (9): 2098 (2019)An unsupervised approach for traffic trace sanitization based on the entropy spaces., , , , and . Telecommun. Syst., 61 (3): 609-626 (2016)