Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks., , and . Inf. Sci., (2015)A new TCP-friendly prioritized video multicast protocol using SPLIT protocol., and . Comput. Commun., 29 (8): 1110-1120 (2006)A new framework for MPEG video delivery over heterogeneous networks., and . Comput. Commun., 31 (11): 2656-2668 (2008)Structure-free message aggregation and routing in traffic information system (SMART)., , , and . J. Netw. Comput. Appl., 36 (3): 974-980 (2013)Detecting indicators of deception in emulated monitoring systems., and . Serv. Oriented Comput. Appl., 13 (1): 17-29 (2019)Recent issues in wireless sensor networks., , , , and . Int. J. Commun. Syst., 26 (9): 1089-1091 (2013)Simulation of Video Multicasting over SPLIT Protocol., and . IMSA, page 331-336. IASTED/ACTA Press, (2005)Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks., , , , , and . Multim. Syst., 21 (1): 49-60 (2015)Special issue on recent advancements in machine learning algorithms for internet of things., , and . Des. Autom. Embed. Syst., 22 (3): 199-200 (2018)Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud., , , and . IEEE Netw., 29 (2): 62-69 (2015)