Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Middleware for internet of things: an evaluation in a small-scale IoT environment., , , , , and . J. Reliab. Intell. Environ., 4 (1): 3-23 (2018)Smart management of next generation bike sharing systems using Internet of Things., and . ISC2, page 1-8. IEEE, (2015)Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey., , , and . Sensors, 14 (1): 299-345 (2014)Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead., , and . Wireless Networks and Security, Springer, (2013)Mobility Pattern Based Misbehavior Detection to Avoid Collision in Vehicular Adhoc Networks., , and . UCAmI, volume 8867 of Lecture Notes in Computer Science, page 300-303. Springer, (2014)Cross-Layer Self Routing: A Self-Managed Routing Approach for MANETs., , and . WiMob, page 284-290. IEEE Computer Society, (2008)Efficient high-rate key management technique for wireless body area networks., , , , and . APCC, page 529-534. IEEE, (2016)Personal Information Disclosure via Voice Assistants: The Personalization-Privacy Paradox., , and . SN Comput. Sci., 1 (5): 280 (2020)To Trust or Not-Trust: Privacy Issues With Voice Assistants., , , and . IT Prof., 22 (5): 46-53 (2020)Augmented materials: spatially embodied sensor networks., , and . Int. J. Commun. Networks Distributed Syst., 11 (4): 453-477 (2013)