Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secured wireless medical data transmission using modified elliptic curve cryptography., , , and . MobileHealth@MobiHoc, page 19-24. ACM, (2013)The able amble: gait recognition using Gaussian mixture model for biometric applications., and . Conf. Computing Frontiers, page 57:1-57:5. ACM, (2015)Journey from Mobile Ad Hoc Networks to Wireless Mesh Networks., , and . Guide to Wireless Mesh Networks, Springer, (2009)A probabilistic routing by using multi-hop retransmission forecast with packet collision-aware constraints in vehicular networks., , and . Ad Hoc Networks, (2014)Multi-Micro Processor System: Another Viewpoint (Response)., and . IFIP Congress, page 955-956. North-Holland/IFIP, (1986)Secure Mobile Computing., , , and . IWDC, volume 2918 of Lecture Notes in Computer Science, page 265-278. Springer, (2003)Handling network uncertainty in heterogeneous wireless networks., , and . INFOCOM, page 2390-2398. IEEE, (2011)Scheduling schemes for interference suppression in healthcare sensor networks., , and . ICC, page 391-396. IEEE, (2014)A hybrid key management scheme for healthcare sensor networks., and . ICC, page 1-6. IEEE, (2016)Using minimization of maximal regret for interface selection in a heterogeneous wireless network., , and . ICC, page 6570-6574. IEEE, (2012)