Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Design of Binary MDS Array Codes with Asymptotically Weak-Optimal Repair., , , , and . CoRR, (2018)Adaptive key pre-distribution model for distributed sensor networks., , , and . IET Commun., 3 (5): 723-732 (2009)A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge., , , , and . INFOCOM, IEEE, (2004)An Improved MDS Condition of Blaum-Bruck-Vardy Codes., , and . ISTC, page 1-5. IEEE, (2018)Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks., , and . Comput. Commun., 33 (13): 1524-1530 (2010)On the Maximum Size of Block Codes Subject to a Distance Criterion., , , , and . IEEE Trans. Inf. Theory, 65 (6): 3751-3757 (2019)Threshold-based cooperative communication of energy harvesting active networked tags., , , , and . Int. J. Ad Hoc Ubiquitous Comput., 24 (4): 225-236 (2017)Cooperative secret delivery in wireless sensor networks., and . Int. J. Ad Hoc Ubiquitous Comput., 14 (4): 226-237 (2013)New HARQ Scheme Based on Decoding of Tail-Biting Convolutional Codes in IEEE 802.16e., , and . IEEE Trans. Vehicular Technology, 60 (3): 912-918 (2011)Permutation Trellis Coded Multi-level FSK Signaling to Mitigate Primary User Interference in Cognitive Radio Networks., , , , and . CoRR, (2014)