Author of the publication

Achieving transparent coexistence in a multi-hop secondary network through distributed computation.

, , , , , and . IPCCC, page 1-7. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Device Pairing., , and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data., , , , and . IEEE Trans. Parallel Distributed Syst., 25 (1): 222-233 (2014)On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks., , , and . Mob. Networks Appl., 12 (5-6): 347-357 (2007)Location-based compromise-tolerant security mechanisms for wireless sensor networks., , , and . IEEE J. Sel. Areas Commun., 24 (2): 247-260 (2006)Welcome message., , and . CNS, page 1-2. IEEE, (2013)Cognitive security: securing the burgeoning landscape of mobile networks., , , , and . IEEE Netw., 30 (4): 66-71 (2016)PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution., , , , and . ESORICS (2), volume 12309 of Lecture Notes in Computer Science, page 610-629. Springer, (2020)PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications., , , , and . ICDCS, page 34-44. IEEE, (2020)Hector: A Reinforcement Learning-based Scheduler for Minimizing Casualties of a Military Drone Swarm., , , , , and . MILCOM, page 887-894. IEEE, (2022)On throughput efficiency of geographic opportunistic routing in multihop wireless networks., , , and . QSHINE, page 41. ACM, (2007)