Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing secure group communication over wireless ad hoc networks based on a virtual subnet model., , , and . IEEE Wirel. Commun., 14 (5): 70-75 (2007)An Efficient Clustering Authentication Mechanism for Mobile Ad Hoc Networks., , and . UIC/ATC, page 388-393. IEEE Computer Society, (2012)DESCV - A Secure Wireless Communication Scheme for Vehicle ad hoc Networking., , , and . Mob. Networks Appl., 14 (5): 611-624 (2009)An Anonymous Communication Scheme with Non-reputation for Vehicular Ad Hoc Networks., , and . MUSIC, volume 274 of Lecture Notes in Electrical Engineering, page 563-568. Springer, (2013)A Secure Shared Group Model of Cloud Storage.. AINA Workshops, page 663-667. IEEE Computer Society, (2013)A secure VLAN construction protocol in wireless ad hoc networks., , and . ITRE, page 68-72. IEEE, (2005)Toward a Mobile Application for Social Sharing Context., , , and . MUSIC, volume 274 of Lecture Notes in Electrical Engineering, page 93-98. Springer, (2013)Exploiting Spatial Locality for Objects Layout in Virtual Environments., , , , and . PCM, volume 5353 of Lecture Notes in Computer Science, page 850-854. Springer, (2008)The Learning Effect of Students' Cognitive Styles in Using Cloud Technology., and . ICWL Workshops, volume 8390 of Lecture Notes in Computer Science, page 155-163. Springer, (2013)Flow Experience Research of Sensing-Intuitive Dimension Learning Styles Based on Visual Programming Language., and . RVSP, page 260-263. IEEE Computer Society, (2015)