Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User-Centric Seamless Handover Scheme for Realtime Applications., , , and . PIMRC, page 1-5. IEEE, (2007)ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System., , , , , and . CLOSER, page 191-200. SciTePress, (2017)Load sharing of location-based routing in overlay networks., , and . PIMRC, page 1-6. IEEE, (2008)On the Feasibility of Deploying Software Attestation in Cloud Environments., , , , , and . IEEE CLOUD, page 128-135. IEEE Computer Society, (2014)Secured tracing for group signatures from attribute-based encryption., , , and . Concurr. Comput. Pract. Exp., (July 2024)Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme., , , , and . NSS, volume 13983 of Lecture Notes in Computer Science, page 155-176. Springer, (2023)A Cell-Planning Model for HetNet with CRE and TDM-ICIC in LTE-Advanced., , and . VTC Spring, page 1-5. IEEE, (2012)Retarding application idle timer expiration for service resumption in challenged network., , and . ISWCS, page 644-648. IEEE, (2011)A Lightweight Approach to Protect Mobile Data., , and . ISCC, page 845-850. IEEE Computer Society, (2007)Proposal of ID Composition for Fast Location Lookup in Overlay Nodes., , and . VTC Fall, page 1975-1979. IEEE, (2007)