Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Message from the general chair.. LCN Workshops, page 1. IEEE Computer Society, (2015)Traffic Engineering Using Segment Routing and Considering Requirements of a Carrier IP Network., , , , and . IEEE/ACM Trans. Netw., 26 (4): 1851-1864 (2018)Identification of contamination zones for sinkhole detection in MANETs., , , and . J. Netw. Comput. Appl., (2015)On modeling and impact of geographic restrictions for human mobility in opportunistic networks., and . Perform. Evaluation, (2019)Changing Trends in Modeling Mobility., , and . J. Electr. Comput. Eng., (2012)Enhancing privacy for passive UHF RFID using an SDR-based reactive jammer., , and . RFID-TA, page 202-207. IEEE, (2017)Adjustable security for RFID-equipped IoT devices., , , , and . RFID-TA, page 208-213. IEEE, (2017)On the Benefits of Loops for Segment Routing Traffic Engineering., , and . LCN, page 32-40. IEEE, (2021)Improving Proximity Classification for Contact Tracing using a Multi-channel Approach., , , and . LCN, page 64-72. IEEE, (2022)Improving Energy Efficiency of MQTT-SN in Lossy Environments Using Seed-Based Network Coding., , and . LCN, page 286-293. IEEE Computer Society, (2017)