Author of the publication

Jamming-based adversarial control of network flow allocation: A passivity approach.

, , , , and . ACC, page 4710-4716. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unconditionally Secure Authenticated Encryption with Shorter Keys., and . WOSIS, page 5-15. INSTICC Press, (2009)On the Structure and Computation of Random Walk Times in Finite Graphs., , , and . CoRR, (2017)On the Structure and Computation of Random Walk Times in Finite Graphs., , , and . IEEE Trans. Autom. Control., 64 (11): 4470-4483 (2019)Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification., , , and . IEEE Trans. Parallel Distributed Syst., 23 (8): 1536-1550 (2012)Efficient Authentication for Mobile and Pervasive Computing., and . IEEE Trans. Mob. Comput., 13 (3): 469-481 (2014)Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games., , , , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 113-129. Springer, (2015)A host takeover game model for competing malware., , , , and . CDC, page 4523-4530. IEEE, (2015)Scalable RFID systems: a privacy-preserving protocol with constant-time identification., , , and . DSN, page 1-10. IEEE Computer Society, (2010)On Secure NOMA Systems With Transmit Antenna Selection Schemes., , , , , , , and . IEEE Access, (2017)Secret Key Agreement: Fundamental Limits and Practical Challenges., , , and . IEEE Wirel. Commun., 24 (3): 72-79 (2017)