Author of the publication

Detection of Access Control Violations in the Secure Sharing of Cloud Storage.

, , , and . CLOSER, page 124-135. SciTePress, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Context-aware mobility management with WiFi/3G offloading for ehealth WBANs., and . Healthcom, page 472-476. IEEE, (2014)Privacy-Aware personal Information Discovery model based on the cloud., , and . LANOMS, page 35-40. IEEE, (2015)Ontology-Based Knowledge Representation for Self-governing Systems., , , and . DSOM, volume 4269 of Lecture Notes in Computer Science, page 74-85. Springer, (2006)Measurement of TCP computational and communication energy cost in MANETs., , , and . Pervasive Mob. Comput., 7 (1): 60-77 (2011)Solving the trust issues in the process of transportation of dangerous goods by using blockchain technology., , , , and . SIN, page 25:1-25:2. ACM, (2018)Energy-Efficient Power Allocation and User-Channel Assignment for NOMA Heterogeneous Ultra-Dense Network., , , and . PIMRC, page 1-7. IEEE, (2020)Interoperability of Open Management Systems., and . Advanced Information Processing Techniques for LAN and MAN Management, volume C-17 of IFIP Transactions, page 209-224. North-Holland, (1993)Secure interworking & roaming of WiMAX with 3G and Wi-Fi., and . Integrated Network Management, page 133-136. IEEE, (2009)Improving Prediction Accuracy for WSN Data Reduction by Applying Multivariate Spatio-Temporal Correlation., , , and . Sensors, 11 (11): 10010-10037 (2011)A Comprehensive Survey on Offload Techniques and Management in Wireless Access and Core Networks., , , and . IEEE Commun. Surv. Tutorials, 17 (3): 1582-1604 (2015)