Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Cryptographic Protocol for Secure Vehicle Data Sharing Over a Consortium Blockchain., , , , , and . iThings/GreenCom/CPSCom/SmartData, page 1281-1286. IEEE, (2018)Scalable versus Accurate Physical Layer Modeling in Wireless Network Simulations., , and . PADS, page 127-134. IEEE Computer Society, (2008)A Line-Based Data Dissemination Protocol for Wireless Sensor Networks with Mobile Sink., and . ICC, page 2201-2205. IEEE, (2008)Adaptive security provisioning for vehicular safety applications., , and . Int. J. Space Based Situated Comput., 7 (1): 16-31 (2017)A novel cryptography based privacy preserving solution for urban mobility and traffic control., and . NTMS, page 1-5. IEEE, (2015)Revisiting neighbor discovery with interferences consideration., , and . PE-WASUN, page 74-81. ACM, (2006)Analytical evaluation of virtual infrastructures for data dissemination in wireless sensor networks with mobile sink., and . Sensor and Actor Networks, page 3-10. ACM, (2007)Surveying Wearable Human Assistive Technology for Life and Safety Critical Applications: Standards, Challenges and Opportunities., and . Sensors, 14 (5): 9153-9209 (2014)Data Dissemination Strategies for Emerging Wireless Body-to-Body Networks based Internet of Humans., , , and . CoRR, (2017)Towards efficient and secure in-home wearable insomnia monitoring and diagnosis system., , , and . BIBE, page 1-6. IEEE Computer Society, (2013)