Author of the publication

Loc-Auth: Location-enabled authentication through attribute-based encryption.

, and . ICNC, page 89-93. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending Proportional Fair Scheduling to Buffer-Aided Relay Access Networks., , , and . IEEE Trans. Vehicular Technology, 68 (1): 1041-1044 (2019)Data User-Based Attribute Based Encryption., , , and . CISS, page 1-5. IEEE, (2020)MobiCacher: Mobility-aware content caching in small-cell networks., , , , and . GLOBECOM, page 4537-4542. IEEE, (2014)Power Efficient User Pairing for Multicasting in Heterogeneous Wireless Networks., , , and . MILCOM, page 1353-1358. IEEE, (2013)Protocol-independent multicast packet delivery improvement service for mobile Ad hoc networks., and . Ad Hoc Networks, 5 (2): 210-227 (2007)What does using TCP as an evaluation tool reveal about MANET routing protocols?, and . IWCMC, page 521-526. ACM, (2006)A cross-layer approach to resource discovery and distribution in mobile ad hoc networks., , and . Mobility Conference, page 54. ACM, (2006)Work-in-Progress-Design and Evaluation of Mixed Reality Programs for Cybersecurity Education., , , and . iLRN, page 1-3. IEEE, (2021)Swarm Interpolation Using an Approximate Chebyshev Distribution., , , , and . ANTS, volume 7461 of Lecture Notes in Computer Science, page 324-331. Springer, (2012)Teacher Views on Storytelling-based Cybersecurity Education with Social Robots., , , , and . IDC, page 508-512. ACM, (2021)