Author of the publication

Privacy-Preserving Point-to-Point Transportation Traffic Measurement through Bit Array Masking in Intelligent Cyber-physical Road Systems.

, , , , and . GreenCom/iThings/CPScom, page 826-833. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight Anonymous Authentication Protocols for RFID Systems., , and . IEEE/ACM Trans. Netw., 25 (3): 1475-1488 (2017)Achieving High Scalability Through Hybrid Switching in Software-Defined Networking., , , , and . IEEE/ACM Trans. Netw., 26 (1): 618-632 (2018)Can CSMA/CA networks be made fair?, and . MobiCom, page 235-246. ACM, (2008)Stochastic analysis of distributed deadlock scheduling., and . PODC, page 265-273. ACM, (2005)On the Performance Regularity of Web Servers., , and . World Wide Web, 7 (3): 241-258 (2004)Monitoring Bodily Oscillation With RFID Tags., , , , and . IEEE Internet of Things Journal, 6 (2): 3840-3854 (2019)Efficient Information Sampling in Multi-Category RFID Systems., , , , , and . IEEE/ACM Trans. Netw., 27 (1): 159-172 (2019)State aggregation of large network domains., , and . Comput. Commun., 30 (4): 873-885 (2007)Estimating the Cardinality of a Mobile Peer-to-Peer Network., , , and . IEEE J. Sel. Areas Commun., 31 (9-Supplement): 359-368 (2013)Analysis of power-aware buffering schemes in wireless sensor networks., , and . ACM Trans. Sens. Networks, 7 (3): 26:1-26:33 (2010)