Author of the publication

Analysis of Chinese Remainder Theorem Based Group Key Management Protocols.

, , and . Security and Management, page 86-92. CSREA Press, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smartphone-based Architecture for Smart Cities., , , and . DIVANet@MSWiM, page 79-83. ACM, (2015)Analysis of Chinese Remainder Theorem Based Group Key Management Protocols., , and . Security and Management, page 86-92. CSREA Press, (2009)SoLVE: A Localization System Framework for VANets using the Cloud and Fog Computing., , , , and . DIVANet@MSWiM, page 17-22. ACM, (2017)A Comparative Analysis of the Impact of Features on Human Activity Recognition with Smartphone Sensors., , , , , and . WebMedia, page 397-404. ACM, (2017)Proactive Certificate Distribution for PKI in VANET., , , , and . Q2SWinet@MSWiM, page 9-13. ACM, (2017)The cost of protecting privacy in multimedia applications.. Q2SWinet, page 51-54. ACM, (2008)Examining privacy in vehicular ad-hoc networks., , , and . DIVANet@MSWiM, page 105-110. ACM, (2012)A performance comparison of dynamic channel and ressource allocation protocols for mobile cellular networks., , and . Mobility Management & Wireless Access Protocols, page 27-34. ACM, (2004)Privacy Preserving Scheme for Location-Based Services., , , and . J. Information Security, 3 (2): 105-112 (2012)Personal and service mobility in ubiquitous computing environments., , , and . Wirel. Commun. Mob. Comput., 4 (6): 595-607 (2004)