Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New efficient mechanisms to secure OLSR protocol., and . FGST, page 46-51. IEEE, (2012)Naval Intelligent Authentication and Support Through Randomization and Transformative Search., and . New Approaches in Intelligent Control, volume 107 of Intelligent Systems Reference Library, Springer, (2016)Towards a High Level Language for Reuse and Integration., , , , , and . IRI (best papers), volume 263 of Advances in Intelligent Systems and Computing, page 219-239. Springer, (2013)Protocol Integration for Trust-Based Communication., and . IRI (best papers), volume 263 of Advances in Intelligent Systems and Computing, page 325-340. Springer, (2013)Access control reinforcement over searchable encryption., and . IRI, page 130-137. IEEE Computer Society, (2014)Knowledge Amplification through Randomization for Scheduling Systems., , , , and . IRI, page 589-598. IEEE Computer Society, (2017)Data flow formalization.. ICINCO-ICSO, page 148-153. INSTICC Press, (2006)UML 2 Interaction Overview Diagram Validation.. DepCoS-RELCOMEX, page 11-16. IEEE Computer Society, (2009)From Petri Nets to UML Model: A New Transformation Approach., , and . IRI, page 503-510. IEEE, (2018)Formalization of UML object dynamics and behavior., and . SMC (5), page 4971-4976. IEEE, (2004)