Author of the publication

STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets.

, , , , , , and . ICA3PP (4), volume 9531 of Lecture Notes in Computer Science, page 427-441. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Insecurity of an efficient certificateless aggregate signature with constant pairing computations., , and . Inf. Sci., (2014)Personalized Privacy-Preserving Data Aggregation for Histogram Estimation., , , , , and . GLOBECOM, page 1-6. IEEE, (2015)A Load-Balancing Mechanism for Distributed SDN Control Plane Using Response Time., , , , and . IEEE Trans. Network and Service Management, 15 (4): 1197-1206 (2018)Multi-Task Learning and Multimodal Fusion for Road Segmentation., , , , and . IEEE Access, (2023)Efficient hierarchical identity-based signatures from lattices., , and . Int. J. Electron. Secur. Digit. Forensics, 5 (1): 1-10 (2013)Breaking A Proxy Signature Scheme From Lattices., and . Int. J. Netw. Secur., 14 (6): 320-323 (2012)Privacy-Preserving Strategyproof Auction Mechanisms for Resource Allocation in Wireless Communications., , , , , , and . BigCom, volume 9784 of Lecture Notes in Computer Science, page 13-26. Springer, (2016)An Efficient Task Assignment Mechanism for Crowdsensing Systems., , , , , and . ICCCS (2), volume 10040 of Lecture Notes in Computer Science, page 14-24. (2016)Identity-Based Proofs of Storage with Enhanced Privacy., , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 461-480. Springer, (2018)Protocol to Compute Polygon Intersection in STC Model., , , and . ICICA (LNCS), volume 7030 of Lecture Notes in Computer Science, page 641-648. Springer, (2011)