Author of the publication

Two-Levels Verification for Secure Data Aggregation in Resource-Constrained Environments.

, , and . ICC, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extensive Experimental Characterization of Communications in Vehicular Ad Hoc Networks within Different Environments., , and . VTC Spring, page 2590-2594. IEEE, (2007)Background subtraction for aerial surveillance conditions., , and . I4CS, page 28-33. IEEE, (2014)Call Admission Control for Multimedia Cellular Networks Using Neuro-dynamic Programming., , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 1208-1213. Springer, (2002)A Reactive QoS Routing Protocol for Ad Hoc Networks., , , and . EUSAI, volume 2875 of Lecture Notes in Computer Science, page 27-41. Springer, (2003)Find a Meeting., , , , , , , and . EUSAI, volume 2875 of Lecture Notes in Computer Science, page 3-14. Springer, (2003)A Game Theory Based Efficient Computation Offloading in an UAV Network., , , and . IEEE Trans. Vehicular Technology, 68 (5): 4964-4974 (2019)UAVs for traffic monitoring: A sequential game-based computation offloading/sharing approach., , , , and . Comput. Networks, (2020)A2Ba: Adaptive Background Modelling for Visual Aerial Surveillance Conditions., , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 2 (4): e3 (2015)Call admission control in cellular networks: a reinforcement learning solution., , and . Int. J. Netw. Manag., 14 (2): 89-103 (2004)A Cooperative Low Power Mac Protocol for Wireless Sensor Networks., , , and . ICC, page 1-6. IEEE, (2011)