Author of the publication

Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection.

, , , , , and . Sensors, 17 (6): 1360 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks., , , , and . FGIT-FGCN, volume 56 of Communications in Computer and Information Science, page 405-412. Springer, (2009)Password typos resilience in honey encryption., , and . ICOIN, page 593-598. IEEE, (2017)Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks., and . IEEE/ACM Trans. Netw., 22 (1): 16-26 (2014)A reliable adaptive forwarding approach in named data networking., , , , and . Future Gener. Comput. Syst., (2019)Special issue on V2X communications and networks., , , and . J. Commun. Networks, 19 (3): 205-208 (2017)Design and QoS of a Wireless System for Real-Time Remote Electrocardiography., , , and . IEEE J. Biomed. Health Informatics, 17 (3): 745-755 (2013)Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems., and . IEEE Trans. Parallel Distributed Syst., 22 (7): 1214-1221 (2011)Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage., , , and . IEEE Trans. Cloud Comput., 10 (2): 1008-1020 (2022)Analysis of NTP pool monitoring system based on multiple monitoring stations., , and . MobiHoc, page 259-264. ACM, (2022)Secure Device-to-Device Authentication in Mobile Multi-hop Networks., , , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 267-278. Springer, (2014)