Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Chained Threshold Proxy Signature without and with Supervision., , , , and . J. Softw. Eng. Appl., 2 (4): 267-275 (2009)Removing TCP congestion control on the last hop in split TCP environments., , , , and . WiOpt, page 92-99. IEEE, (2016)Content management in a mobile ad hoc network: Beyond opportunistic strategy., , , and . INFOCOM, page 266-270. IEEE, (2011)An Architectural Infrastructure and Topological Optimization for End System Multicast., and . MASCOTS, page 481-. IEEE Computer Society, (2002)InterMR: Inter-MANET routing in heterogeneous MANETs., , , , , and . MASS, page 372-381. IEEE Computer Society, (2010)Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability., , , and . Security and Management, page 307-313. CSREA Press, (2009)Robust rate adaptation for 802.11 wireless networks., , , and . MobiCom, page 146-157. ACM, (2006)Characterizing flows in large wireless data networks., , , and . MobiCom, page 174-186. ACM, (2004)SmartSiren: virus detection and alert for smartphones., , , and . MobiSys, page 258-271. ACM, (2007)Managing interoperation in multi-organization MANETs by dynamic gateway assignment., , and . Integrated Network Management, page 129-136. IEEE, (2011)