Author of the publication

Fostering secure cross-layer collaborative communications by means of covert channels in MEC environments.

, , , and . Comput. Commun., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond., , , , and . IEEE Cloud Comput., 5 (5): 92-100 (2018)CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems., , , , , and . Inf. Sci., (2019)A Novel Blockchain Scheme Combining Prime Numbers and Iris for Encrypting Coding., , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 609-618. IEEE, (2019)Automated Production of Predetermined Digital Evidence., , , and . IEEE Access, (2013)Human-Driven Edge Computing and Communication: Part 1., , , , , and . IEEE Commun. Mag., 55 (11): 70-71 (2017)Have you permission to answer this phone?, , , , and . IWBF, page 1-7. IEEE, (2018)Detection of Lurkers in Online Social Networks., , , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 1-15. Springer, (2017)Multimedia summarization using social media content., , , , and . Multimedia Tools Appl., 77 (14): 17803-17827 (2018)Towards the Design of a Covert Channel by Using Web Tracking Technologies., , and . DependSys, volume 1123 of Communications in Computer and Information Science, page 231-246. Springer, (2019)Optimization of Score-Level Biometric Data Fusion by Constraint Construction Training., , , , and . iSCI, volume 1122 of Communications in Computer and Information Science, page 167-179. Springer, (2019)