Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Dissemination and Power Management in Wireless Sensor Networks., , and . ACC (4), volume 193 of Communications in Computer and Information Science, page 593-607. Springer, (2011)A New Approach of Announcement and Avoiding Routing Voids in Wireless Sensor Networks., , , and . GLOBECOM, page 1790-1794. IEEE, (2008)A seamless handoff protocol for hierarchical Mobile IPv4., and . MWCN, page 651-655. IEEE, (2002)Fault-Tolerant Prediction-Based Scheme for Target Tracking Application., , , and . GLOBECOM, page 1-6. IEEE, (2009)A semantic based pre-fetch scheme for SMIL presentation proxy-delivery., and . MMM, IEEE, (2006)Self-Calibration Methods for Uncontrolled Environments in Sensor Networks: A Reference Survey., , , and . CoRR, (2019)Anonymous authentication scheme in e-Health Cloud environment., , , and . ICITST, page 47-52. IEEE, (2016)DZ50: Energy-efficient Wireless Sensor Mote Platform for Low Data Rate Applications., , , , , , , , and . EUSPN/ICTH, volume 37 of Procedia Computer Science, page 189-195. Elsevier, (2014)Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications., , , and . CODASPY, page 139-141. ACM, (2017)Solving the consensus problem in a mobile environment., , and . IPCCC, page 29-35. IEEE, (1999)