Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using identities to achieve enhanced privacy in future content delivery networks., and . Comput. Electr. Eng., 38 (2): 346-355 (2012)Identity based architecture for secure communication in future internet., , , and . Digital Identity Management, page 45-48. ACM, (2010)Scalable Directory Service for IoT Applications., , , and . IEEE Commun. Stand. Mag., 1 (3): 58-65 (2017)Automatic Construction of Name-Bound Virtual Networks for IoT and its Management., , , , and . J. Inf. Process., (2018)Repeated Leader Follower Game for Managing Cloud Networks With Limited Resources., , , and . IEEE Access, (2019)A Genetic Approach to Continuous Optimization of Virtual Network Embedding., , and . ICIN, page 70-74. IEEE, (2021)Integrating an identity-based control plane with the HIMALIS network architecture., , and . NetSoft, page 1-5. IEEE, (2015)Filtering observations to improve resource control in virtual computer and network systems., , and . NOMS, page 1-7. IEEE, (2018)An overlay network approach to find objects in the future internet., and . Future Network & Mobile Summit, page 1-10. IEEE, (2013)Research and experimentation with the HIMALIS network architecture for future internet., , and . Future Network & Mobile Summit, page 1-8. IEEE, (2012)