Author of the publication

Optimizing Network-Assisted WLAN Systems with Aggressive Channel Utilization.

, , , and . NEW2AN, volume 9870 of Lecture Notes in Computer Science, page 217-229. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cumulative-Separable Codes, and . CoRR, (2010)Lightweight structures of big numbers for cryptographic primitives in limited devices., , , , , , and . ICUMT, page 289-293. IEEE, (2017)Accident Detection in Internet of Vehicles using Blockchain Technology., and . ICOIN, page 766-771. IEEE, (2020)Secure Information Exchange in Defining the Location of the Vehicle., and . TSP, page 1-5. IEEE, (2018)Using Generalized (L, G)-Codes for Implementation the Classic McEliece Cryptosystem., and . ICUMT, page 231-234. IEEE, (2023)Secure Environmental Monitoring for Industrial Internet of Things: from Framework to Live Implementation., , , and . ICL-GNSS, page 1-5. IEEE, (2019)MLSB optimal effective weighted container construction for WF5 embedding algorithm., , and . ICUMT, page 1-6. IEEE, (2018)Some new codes from binary Goppa codes and a method of shortening linear codes., , , , and . IET Commun., (2013)Secure and Connected Wearable Intelligence for Content Delivery at a Mass Event: A Case Study., , , , , , , and . J. Sens. Actuator Networks, 6 (2): 5 (2017)Privacy Homomorphism for Delegation of the Computations., , and . NEW2AN, volume 4003 of Lecture Notes in Computer Science, page 474-480. Springer, (2006)