Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis., and . SocialCom/PASSAT, page 65-72. IEEE Computer Society, (2010)Risk-Aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid., , , and . GLOBECOM, page 1-6. IEEE, (2011)Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes., , and . IEEE Trans. Dependable Sec. Comput., 4 (3): 228-242 (2007)Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis., , , and . IEEE Trans. Information Forensics and Security, 8 (6): 936-948 (2013)Channel-aware priority transmission scheme using joint channel estimation and data loading for OFDM systems., , and . IEEE Trans. Signal Processing, 53 (8-2): 3297-3310 (2005)JET: dynamic join-exit-tree amortization and scheduling for contributory key management., , , and . IEEE/ACM Trans. Netw., 14 (5): 1128-1140 (2006)A joint channel estimation and unequal error protection scheme for video transmission in OFDM systems., , and . ICIP (1), page 549-552. IEEE, (2002)Channel aware unequal error protection for image transmission over broadband wireless LAN., , and . ICIP (1), page 93-96. IEEE, (2003)Hierarchical group access control for secure multicast communications., and . IEEE/ACM Trans. Netw., 15 (6): 1514-1526 (2007)A scalable multicast key management scheme for heterogeneous wireless networks., , and . IEEE/ACM Trans. Netw., 12 (4): 653-666 (2004)