Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and fair auctions over ad hoc networks., , and . Int. J. Electron. Bus., 5 (3): 276-293 (2007)A proposal of a distributed access control over Fog computing: The ITS use case., , and . PEMWN, page 1-7. IEEE, (2017)Assessment for Android apps permissions a proactive approach toward privacy risk., , and . IWCMC, page 1465-1470. IEEE, (2017)Blockchain for Ridesharing: A Systematic Literature Review., , and . SmartNets, page 1-6. IEEE, (2023)Performance Evaluation of LoRaWAN Propagation Models for Real-Time IoT Deployments., , , , and . ISORC, page 1-6. IEEE, (2024)A SET Based Approach to Secure the Payment in Mobile Commerce., , , and . LCN, page 136-137. IEEE Computer Society, (2002)Messaging System for African Countries: Afrimail Project., , and . ICCC, page 171-175. International Council for Computer Communication / Elsevier, (1986)A protocol for setting up ad hoc mobile clouds over spontaneous MANETs: A proof of concept., , and . CIoT, page 1-6. IEEE, (2016)Protection of IoT transaction using ID-KEM based on three-pass protocol countermeasure., , and . IWCMC, page 423-428. IEEE, (2017)An IDMS approach towards privacy and new requirements in IoT., , and . IWCMC, page 429-434. IEEE, (2017)