Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards an ultra lightweight block ciphers for Internet of Things., , , , and . J. Inf. Secur. Appl., (2021)Overview of the mobility related security challenges in LPWANs., , , , and . Comput. Networks, (2021)Solar Potential Assessment using Multi-Class Buildings Segmentation from Aerial Images., , , , and . CoRR, (2021)IP-based transport of voice traffic in the UMTS radio access network: analytical study and empirical validation., , and . Ann. des Télécommunications, 60 (5-6): 610-629 (2005)VNFO-DCSC: A Novel Secure End-to-End NFV Marketplace Using Dynamic Composite Smart Contracts., , , , and . GLOBECOM, page 1632-1637. IEEE, (2023)Smart Contract Based Solution for Secure Distributed SDN., , , , and . NTMS, page 1-6. IEEE, (2021)Implementation of SCHC in NS-3 and Comparison with 6LoWPAN., , , , , and . ICT, page 432-436. IEEE, (2019)Optimization Framework for Resource Allocation in IEEE 802.15.5 Hop-1., , , , and . ACIT, page 1-6. IEEE, (2018)Cloud Assisted Privacy Preserving Using Homomorphic Encryption., , and . CSNet, page 1-8. IEEE, (2020)Analytical framework for dimensioning hierarchical WiMax-WiFi networks., , , and . Comput. Networks, 53 (3): 299-309 (2009)