Author of the publication

Evaluation Framework of Opportunistic Flooding in Wireless Sensor Networks.

, , and . EUC, page 87-94. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Calantha: Content distribution across geo-distributed datacenters., , , , and . INFOCOM Workshops, page 724-729. IEEE, (2017)Blockchain for applications of clinical trials: Taxonomy, challenges, and future directions., , , and . IET Commun., 16 (20): 2371-2393 (2022)Trade-off between maximum cardinality of collision sets and accuracy of RFID reader-to-reader collision detection., , , , and . EURASIP J. Embed. Syst., (2013)Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme., , , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 839-846. Springer, (2016)Performance evaluation of reliable and unreliable opportunistic flooding in wireless sensor network., , and . ICON, page 7-12. IEEE, (2011)Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing., , , and . Int. J. Netw. Secur., 20 (6): 1074-1084 (2018)Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation., , , and . BWCCA, volume 12 of Lecture Notes on Data Engineering and Communications Technologies, page 811-820. Springer, (2017)A novel simulator for RFID reader-to-reader anti-collision protocols., , , , and . EURFID, page 59-64. IEEE, (2015)Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing., , and . Int. J. Netw. Secur., 22 (1): 24-35 (2020)Simulating Reader-to-Reader Interference in RFID Systems., , , , and . AINA Workshops, page 1063-1069. IEEE Computer Society, (2013)