Author of the publication

Countermeasures Against False-Name Attacks on Truthful Incentive Mechanisms for Crowdsourcing.

, , , , and . IEEE J. Sel. Areas Commun., 35 (2): 478-485 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving the Shortest Clock Period by Inserting the Minimum Amount of Delay., , and . ISAAC, volume 834 of Lecture Notes in Computer Science, page 669-677. Springer, (1994)Source-waiting QoS routing in networks with advanced resource reservations., , , and . ICC, page 619-624. IEEE, (2001)Circuits/Cutsets Duality and a Unified Algorithmic Framework for Survivable Logical Topology Design in IP-over-WDM Optical Networks., , and . INFOCOM, page 1026-1034. IEEE, (2009)Constrained Relay Node Placement in Wireless Sensor Networks to Meet Connectivity and Survivability Requirements., , , and . INFOCOM, page 281-285. IEEE, (2008)Optimal lightpath routing and rerouting in WDM networks.. GLOBECOM, page 2124-2128. IEEE, (2001)Population-Aware Relay Placement for Wireless Multi-Hop Based Network Disaster Recovery., , , , , and . GLOBECOM, page 1-6. IEEE, (2017)Towards Min-Cost Virtual Infrastructure Embedding., , and . GLOBECOM, page 1-6. IEEE, (2015)Computational Comparison of Two Algorithms for the Euclidean Single Facility Location Problem., and . INFORMS J. Comput., 3 (3): 207-212 (1991)Minimizing the Lennard-Jones potential function on a massively parallel computer., , and . ICS, page 409-416. ACM, (1992)Efficient Anonymous Message Submission., , , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 217-230 (2018)