Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alternative Communication System for Emergency Situations., , , and . WEBIST (2), page 397-402. SciTePress, (2014)IBSC System for Victims Management in Emergency Scenarios., , , and . IoTBDS, page 276-283. SciTePress, (2017)Secure UAV-Based System to Detect Small Boats Using Neural Networks., , , and . Complex., (2019)Forest Fire Prevention, Detection, and Fighting Based on Fuzzy Logic and Wireless Sensor Networks., , , , , and . Complex., (2018)Application of Fuzzy Logic in a Secure Beacon-Based Guidance System for Public Transportation., , , and . Int. J. Appl. Math. Comput. Sci., 32 (3): 371-387 (2022)Analysis of Lightweight Cryptographic Solutions for Authentication in IoT., and . EUROCAST (2), volume 8112 of Lecture Notes in Computer Science, page 373-380. Springer, (2013)Poster: Revocation in VANETs Based on k-ary Huffman Trees., , and . SmartObjects@MobiCom, page 25-26. ACM, (2015)Efficient Public Key Certificate Management for Mobile Ad Hoc Networks., and . EURASIP J. Wireless Comm. and Networking, (2011)Design and Implementation of an Application for Deploying Vehicular Networks with Smartphones., , and . IJDSN, (2013)Self-organized authentication in mobile ad-hoc networks., and . J. Commun. Networks, 11 (5): 509-517 (2009)