Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On modeling and impact of geographic restrictions for human mobility in opportunistic networks., and . Perform. Evaluation, (2019)Identification of contamination zones for sinkhole detection in MANETs., , , and . J. Netw. Comput. Appl., (2015)Changing Trends in Modeling Mobility., , and . J. Electr. Comput. Eng., (2012)Message from the general chair.. LCN Workshops, page 1. IEEE Computer Society, (2015)Traffic Engineering Using Segment Routing and Considering Requirements of a Carrier IP Network., , , , and . IEEE/ACM Trans. Netw., 26 (4): 1851-1864 (2018)Towards securing Public-Key Storage using Hyperledger Fabric., , and . ICBC, page 1-3. IEEE, (2022)Deploying a mesh-based command and control sensing system in a disaster area maneuver., , , , and . SenSys, page 335-336. ACM, (2011)On the Benefits of Loops for Segment Routing Traffic Engineering., , and . LCN, page 32-40. IEEE, (2021)Improving Proximity Classification for Contact Tracing using a Multi-channel Approach., , , and . LCN, page 64-72. IEEE, (2022)Decentralizing loT Public- Key Storage using Distributed Ledger Technology., , and . IWCMC, page 172-177. IEEE, (2022)