Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Preserving Scheme for Location-Based Services., , , and . J. Information Security, 3 (2): 105-112 (2012)Examining privacy in vehicular ad-hoc networks., , , and . DIVANet@MSWiM, page 105-110. ACM, (2012)A Comparative Analysis of the Impact of Features on Human Activity Recognition with Smartphone Sensors., , , , , and . WebMedia, page 397-404. ACM, (2017)SoLVE: A Localization System Framework for VANets using the Cloud and Fog Computing., , , , and . DIVANet@MSWiM, page 17-22. ACM, (2017)The cost of protecting privacy in multimedia applications.. Q2SWinet, page 51-54. ACM, (2008)Proactive Certificate Distribution for PKI in VANET., , , , and . Q2SWinet@MSWiM, page 9-13. ACM, (2017)A performance comparison of dynamic channel and ressource allocation protocols for mobile cellular networks., , and . Mobility Management & Wireless Access Protocols, page 27-34. ACM, (2004)Smartphone-based Architecture for Smart Cities., , , and . DIVANet@MSWiM, page 79-83. ACM, (2015)Analysis of Chinese Remainder Theorem Based Group Key Management Protocols., , and . Security and Management, page 86-92. CSREA Press, (2009)Personal and service mobility in ubiquitous computing environments., , , and . Wirel. Commun. Mob. Comput., 4 (6): 595-607 (2004)