Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using identities to achieve enhanced privacy in future content delivery networks., and . Comput. Electr. Eng., 38 (2): 346-355 (2012)Automatic Construction of Name-Bound Virtual Networks for IoT and its Management., , , , and . J. Inf. Process., (2018)Scalable Directory Service for IoT Applications., , , and . IEEE Commun. Stand. Mag., 1 (3): 58-65 (2017)Repeated Leader Follower Game for Managing Cloud Networks With Limited Resources., , , and . IEEE Access, (2019)Identity based architecture for secure communication in future internet., , , and . Digital Identity Management, page 45-48. ACM, (2010)Consideration On Automation of 5G Network Slicing with Machine Learning., , , and . Kaleidoscope, page 1-8. IEEE, (2018)Research and experimentation with the HIMALIS network architecture for future internet., , and . Future Network & Mobile Summit, page 1-8. IEEE, (2012)An overlay network approach to find objects in the future internet., and . Future Network & Mobile Summit, page 1-10. IEEE, (2013)Integrating an identity-based control plane with the HIMALIS network architecture., , and . NetSoft, page 1-5. IEEE, (2015)A Genetic Approach to Continuous Optimization of Virtual Network Embedding., , and . ICIN, page 70-74. IEEE, (2021)