Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight Sharing Scheme for Data Integrity Protection in WSNs., , , , , and . Wireless Personal Communications, 89 (1): 211-226 (2016)Dimensionality reduction in data mining: A Copula approach., , , , and . Expert Syst. Appl., (2016)Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET., , , and . J. Inf. Secur. Appl., (2018)Impact of Duty-Cycling: Towards Mostly-Off Sensor Networks., , and . Int. J. Bus. Data Commun. Netw., 12 (1): 16-35 (2016)Coalition formation with dynamically changing externalities., , , and . Eng. Appl. Artif. Intell., (2020)Toward the Right Communication Protocol for Web Services., , , and . Int. J. Web Serv. Res., 2 (2): 19-42 (2005)Implementation and comparison of binary thinning algorithms on GPU., , and . Computing, 101 (8): 1091-1117 (2019)Big Data Technologies to Improve Medical Data Warehousing., , , and . BDCA, page 21:1-21:5. ACM, (2017)A Dynamic and Distributed Key Management Scheme for Wireless Sensor Networks., , , , , and . ICC 2016, page 70:1-70:6. ACM, (2016)A Correct-by-Construction Model for Attribute-Based Access Control., , and . MEDI, volume 11163 of Lecture Notes in Computer Science, page 233-247. Springer, (2018)