From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Hybrid Graphical Password Based System., , , и . ICA3PP (2), том 7017 из Lecture Notes in Computer Science, стр. 153-164. Springer, (2011)Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks., , и . Int. J. Grid Util. Comput., 4 (2/3): 119-127 (2013)Providing QoS guarantees to multiple classes of traffic in wireless sensor networks., , , и . AICCSA, стр. 216-222. IEEE Computer Society, (2008)An Efficient Virtual Machine Placement via Bin Packing in Cloud Data Centers., , , , , и . AINA, том 926 из Advances in Intelligent Systems and Computing, стр. 977-987. Springer, (2019)Secure & robust RED (SR-RED)., , и . ICT, стр. 1-5. IEEE, (2013)Mobile Element Path Planning for Gathering Transit-Time Constrained Data., , и . PDCAT, стр. 221-226. IEEE Computer Society, (2011)Data Gathering for Periodic Sensor Applications., , и . PDCAT, стр. 215-220. IEEE Computer Society, (2011)A framework for real time communication in sensor networks., , и . AICCSA, стр. 1-7. IEEE Computer Society, (2010)Mobile-Element Data Gathering Scheme.. PDCAT, стр. 227-230. IEEE Computer Society, (2011)Five acts of consumer behavior: A potential security and privacy threat to Internet of Things., , и . ICCE, стр. 1-3. IEEE, (2018)