Author of the publication

Authentication, authorization, and accounting real-time secondary market services.

, , and . ICC, page 1005-1009. IEEE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Multimedia Big Data Aggregation in Large-Scale Wireless Sensor Networks., , , , and . ACM Trans. Multim. Comput. Commun. Appl., 12 (4s): 60:1-60:19 (2016)Social-Aware Graph-Based Collaborative Caching in Edge-User Networks., , , , and . IEEE Trans. Veh. Technol., 72 (6): 7926-7941 (June 2023)Performance Analysis of IEEE 802.11 DCF in Imperfect Channels., , , and . IEEE Trans. Veh. Technol., 55 (5): 1648-1656 (2006)OMAR: Utilizing Multiuser Diversity in Wireless Ad Hoc Networks., , , , and . IEEE Trans. Mob. Comput., 5 (12): 1764-1779 (2006)Distributed and Energy-Efficient Mobile Crowdsensing with Charging Stations by Deep Reinforcement Learning., , , , , and . IEEE Trans. Mob. Comput., 20 (1): 130-146 (2021)No-Reference Stereoscopic Image Quality Assessment Based on Image Distortion and Stereo Perceptual Information., , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 3 (1): 59-72 (2019)Trickle Irrigation: Congestion Relief for Communication With Network Coding., , , and . IEEE Trans. Vehicular Technology, 67 (9): 8695-8708 (2018)Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes., , , and . SASN, page 97-106. ACM, (2005)TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning., , , , , , and . IEEE Internet Things J., 7 (7): 6647-6662 (2020)Cooperative Caching Strategy With Content Request Prediction in Internet of Vehicles., , , , and . IEEE Internet Things J., 8 (11): 8964-8975 (2021)