Author of the publication

Privacy-Preserving Traffic Management: A Blockchain and Zero-Knowledge Proof Inspired Approach.

, , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Incentivized Cooperative Architecture for Dynamic Spectrum Access Networks., , , , and . IEEE Trans. Wirel. Commun., 12 (10): 5154-5161 (2013)Data User-Based Attribute Based Encryption., , , and . CISS, page 1-5. IEEE, (2020)Ad Hoc Multicast Routing Algorithm with Swarm Intelligence., and . Mob. Networks Appl., 10 (1-2): 47-59 (2005)MobiCacher: Mobility-aware content caching in small-cell networks., , , , and . GLOBECOM, page 4537-4542. IEEE, (2014)What does using TCP as an evaluation tool reveal about MANET routing protocols?, and . IWCMC, page 521-526. ACM, (2006)A cross-layer approach to resource discovery and distribution in mobile ad hoc networks., , and . Mobility Conference, page 54. ACM, (2006)Extending Proportional Fair Scheduling to Buffer-Aided Relay Access Networks., , , and . IEEE Trans. Vehicular Technology, 68 (1): 1041-1044 (2019)A Graph Matching Approach to Optimal Task Assignment in Distributed Computing Systems Using a Minimax Criterion., and . IEEE Trans. Computers, 34 (3): 197-203 (1985)Power Efficient User Pairing for Multicasting in Heterogeneous Wireless Networks., , , and . MILCOM, page 1353-1358. IEEE, (2013)Protocol-independent multicast packet delivery improvement service for mobile Ad hoc networks., and . Ad Hoc Networks, 5 (2): 210-227 (2007)