Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-Layer Modeling of Wireless Channels: An Overview of Basic Principles., and . Wireless Personal Communications, 74 (1): 23-44 (2014)Highly dynamic spectrum management within licensed shared access regulatory framework., , , , , and . IEEE Communications Magazine, 54 (3): 100-109 (2016)Global communications newsletter: June 2013., , , , , , , , , and . IEEE Communications Magazine, (2013)Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity., , , , , and . TrustCom/BigDataSE/ISPA (1), page 826-833. IEEE, (2015)Precise Delay Analysis for IEEE 802.11 Legacy Ad-Hoc Networks., and . VTC Spring, page 2956-2960. IEEE, (2007)Analysis of a receiver-based reliable broadcast approach for vehicular networks., , , and . Ad Hoc Networks, (2016)Highly Dynamic Spectrum Management within Licensed Shared Access Regulatory Framework., , , , , and . CoRR, (2015)Safe, Secure Executions at the Network Edge: Coordinating Cloud, Edge, and Fog Computing., , , , , and . IEEE Software, 35 (1): 30-37 (2018)Analyzing Effects of Directionality and Random Heights in Drone-Based mmWave Communication., , , , , , and . IEEE Trans. Vehicular Technology, 67 (10): 10064-10069 (2018)Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications., , , , , and . CoRR, (2019)