Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SecureTCG: a lightweight cheating-detection protocol for P2P multiplayer online trading card games., , , , and . Secur. Commun. Networks, 7 (12): 2412-2431 (2014)Reorchestration: a Reactive Orchestration Architecture., , and . NetSoft, page 498-505. IEEE, (2019)Multipath source routing strategies for video transmission in ad hoc wireless networks., , , and . Wirel. Networks, 21 (3): 859-869 (2015)ANI: Abstracted Network Inventory for Streamlined Service Placement in Distributed Clouds., , , and . NetSoft, page 319-325. IEEE, (2020)Handover and Load Balancing for Distributed Network Control: Applications in ITS Message Dissemination., , , , and . ICCCN, page 1-8. IEEE, (2018)Platforms for Smart Environments and Future Internet Design: A Survey., , , , , , and . IEEE Access, (2019)SMSCrypto: A lightweight cryptographic framework for secure SMS transmission., , , , , , and . J. Syst. Softw., 86 (3): 698-706 (2013)Demonstration of Resource Orchestration Using Big Data Analytics for Dynamic Slicing in 5G Networks., , , , , , and . ECOC, page 1-3. IEEE, (2018)Software-defined networking based capacity sharing in hybrid networks., , , , , and . ICNP, page 1-6. IEEE Computer Society, (2013)Implementation of data survival in unattended Wireless Sensor Networks using cryptography., , , , and . LCN, page 961-967. IEEE Computer Society, (2010)