Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Threats in Network Coding-Enabled Mobile Small Cells., , , , and . BROADNETS, volume 263 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 337-346. Springer, (2018)Utility based node selection scheme for cooperative localization., and . IPIN, page 1-6. IEEE, (2011)Miniaturized dual-band balanced antenna for LTE using meander lines., , , and . SMACD, page 1-4. IEEE, (2016)SmartWall: Novel RFID-Enabled Ambient Human Activity Recognition Using Machine Learning for Unobtrusive Health Monitoring., , , , , , , and . IEEE Access, (2019)Security Framework for the Semiconductor Supply Chain Environment., , , , , , and . BROADNETS, volume 263 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 159-168. Springer, (2018)A load balanced aware routing protocol for wireless ad hoc networks., , and . ICT, page 25-30. IEEE, (2009)A link-to-system level interface for B3G scenarios., , , , , and . WPNC, page 233-240. IEEE, (2010)Combination of a geolocation database access with infrastructure sensing in TV bands., , , and . EURASIP J. Wireless Comm. and Networking, (2014)Energy-efficient game-theoretical random access for M2M communications in overlapped cellular networks., , , , , , and . Comput. Networks, (2017)A Signature Scheme with Unlinkable-yet-Accountable Pseudonymity for Privacy-Preserving Crowdsensing., , , , and . IEEE Trans. Mob. Comput., 19 (4): 752-768 (2020)