Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy-Efficient Security for Voice over IP., , , , and . Int. J. Netw. Secur., 17 (1): 7-22 (2015)Identity Based Key Distribution Framework for Link Layer Security of AMI Networks., , , and . IEEE Trans. Smart Grid, 9 (4): 3166-3179 (2018)On cellular network planning and operation with M2M signalling and security considerations., , , and . ICC Workshops, page 429-434. IEEE, (2014)Perception-aware packet-loss resilient compression for networked haptic systems., , , and . Comput. Commun., 36 (15-16): 1621-1628 (2013)Mobile Apps identification based on network flows., , , , and . Knowl. Inf. Syst., 55 (3): 771-796 (2018)IoT survey: An SDN and fog computing perspective., , , and . Comput. Networks, (2018)OPriv: Optimizing Privacy Protection for Network Traffic., , and . J. Sens. Actuator Networks, 10 (3): 38 (2021)EmuNET: a real-time network emulator., and . SAC, page 357-362. ACM, (2004)Automated device for determination of skin lesion regions., , , and . SAC, page 859-860. ACM, (2009)PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems., , , and . ATC, volume 4158 of Lecture Notes in Computer Science, page 205-216. Springer, (2006)