Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private Security for the Cloud Mobile via a Strong Authentication Method., , , and . CDVE, volume 11792 of Lecture Notes in Computer Science, page 190-200. Springer, (2019)Machine learning for networking., , , and . Ann. des Télécommunications, 77 (5-6): 251-252 (2022)Satisfying QoS Requirements in NGN Networks Using a Dynamic Adaptive Queuing Delay Control Method., and . FNC/MobiSPC, volume 56 of Procedia Computer Science, page 225-232. Elsevier, (2015)Taxonomy and comparative study of NDN forwarding strategies., , , , and . COMNET, page 1-8. IEEE, (2017)Location and Time Based Access Security Control Scheme for Mobile Cloud Computing., , and . PEMWN, page 1-8. IEEE, (2023)TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things., , and . IWCMC, page 747-752. IEEE, (2017)Covering a 3D flat surface with autonomous and mobile wireless sensor nodes., , , and . IWCMC, page 1628-1633. IEEE, (2017)CTMS-SIOT: A context-based trust management system for the social Internet of Things., , and . IWCMC, page 1903-1908. IEEE, (2017)A new LTMA-ABE location and time access security control scheme for mobile cloud., , and . J. Supercomput., 79 (11): 12074-12105 (2023)Veterinary Drone: Blockchain-Based System for Cattle Health Monitoring., , , , and . IWCMC, page 1613-1618. IEEE, (2023)