Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Permission-free Keylogging through Touch Events Eavesdropping on Mobile Devices., , and . PerCom Workshops, page 28-33. IEEE, (2019)Special section on wireless network behaviour and design., and . Comput. Commun., 35 (18): 2173-2174 (2012)The Emergency Direct Mobile App: Safety Message Dissemination over a Multi-Group Network of Smartphones using Wi-Fi Direct., , and . MobiWac, page 99-106. ACM, (2016)Future channel reservation medium access control (FCR-MAC) protocol for multi-radio multi-channel wireless mesh networks., , and . PE-WASUN, page 71-79. ACM, (2008)DySCO: a dynamic spectrum and contention controlframework for enhanced broadcast communication invehicular networks., , and . MOBIWAC, page 97-106. ACM, (2012)A differentiated distributed coordination function MAC protocol for cluster-based wireless ad hoc networks., , , , , and . PE-WASUN, page 77-86. ACM, (2004)An Adaptive Load Balancing Middleware for Distributed Simulation., , , and . ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 873-883. Springer, (2006)Generic uneven level protection algorithm for multimedia data transmission over packet-switched networks., , , , , , and . ICCCN, page 340-346. IEEE, (2001)Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks., and . Int. J. Inf. Sec., 6 (6): 379-392 (2007)Special Issue on: 'Resources and mobility management in wireless networks'., and . Wirel. Commun. Mob. Comput., 8 (3): 277-278 (2008)