Author of the publication

Evaluation of Authentication Based Elliptic Curve Cryptography in Wireless Sensor Networks in IoT Context.

, and . SoftCOM, page 1-5. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modified LLL algorithm with shifted start column., and . CoRR, (2016)Fine Synchronization through UWB TH-PPM Impulse Radios, and . CoRR, (2011)Compensation schemes and performance analysis of jointly nonlinear amplifier and timing errors for CP-OFDM based cognitive radio networks., , , and . Wireless Networks, 25 (4): 2173-2185 (2019)A Double Data Rate, Low Complexity 2 x 2 MIMO Scheme Based on a Combination of Alamouti System and Orthogonal Codes., and . ICAIT, volume 7593 of Lecture Notes in Computer Science, page 310-318. Springer, (2012)Adaptive Predistortions Based on Neural Networks Associated with Levenberg-Marquardt Algorithm for Satellite Down Links., , and . EURASIP J. Wireless Comm. and Networking, (2008)Metric anticipation to manage mobility in mobile mesh and ad hoc wireless networks., , , and . Ann. des Télécommunications, 73 (11-12): 787-802 (2018)Energy Efficiency Performance for 5G Cellular Networks., and . WWIC, volume 10372 of Lecture Notes in Computer Science, page 99-111. Springer, (2017)A Real-time Posture Monitoring System Towards Bad Posture Detection., , , and . Wirel. Pers. Commun., 120 (2): 1207-1227 (2021)Channel Estimation Study for Block - Pilot Insertion in OFDM Systems under Slowly Time Varying Conditions, and . CoRR, (2012)Performance Degradation of OFDM and MC-CDMA to Carrier Phase Jitter., and . ICWN, page 459-463. CSREA Press, (2006)