Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of contamination zones for sinkhole detection in MANETs., , , and . J. Netw. Comput. Appl., (2015)On modeling and impact of geographic restrictions for human mobility in opportunistic networks., and . Perform. Evaluation, (2019)Message from the general chair.. LCN Workshops, page 1. IEEE Computer Society, (2015)Changing Trends in Modeling Mobility., , and . J. Electr. Comput. Eng., (2012)Traffic Engineering Using Segment Routing and Considering Requirements of a Carrier IP Network., , , , and . IEEE/ACM Trans. Netw., 26 (4): 1851-1864 (2018)Towards securing Public-Key Storage using Hyperledger Fabric., , and . ICBC, page 1-3. IEEE, (2022)Deploying a mesh-based command and control sensing system in a disaster area maneuver., , , , and . SenSys, page 335-336. ACM, (2011)WIP: Real-world 3D models derived from mobile mapping for ray launching based propagation loss modeling., , , , , , and . WoWMoM, page 161-164. IEEE, (2022)Decentralizing loT Public- Key Storage using Distributed Ledger Technology., , and . IWCMC, page 172-177. IEEE, (2022)Enhancing privacy for passive UHF RFID using an SDR-based reactive jammer., , and . RFID-TA, page 202-207. IEEE, (2017)