Author of the publication

RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks.

, , , , and . Comput. Networks, 54 (1): 79-96 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Content-Based Recommendation and User Privacy in Social-Tagging Systems., , , and . CoRR, (2016)Mathematically optimized, recursive prepartitioning strategies for k-anonymous microaggregation of large-scale datasets., , , , , and . Expert Syst. Appl., (2020)Securing Agents against Malicious Host in an Intrusion Detection System., , , and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 94-105. Springer, (2007)On the regulation of personal data distribution in online advertising platforms., , , and . Eng. Appl. Artif. Intell., (2019)Optimized query forgery for private information retrieval., and . IEEE Trans. Inf. Theory, 56 (9): 4631-4642 (2010)Incremental k-Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling., , , and . IEEE Access, (2018)Punishing Malicious Hosts with the Cryptographic Traces Approach., , , and . New Gener. Comput., 24 (4): 351-376 (2006)Secure brokerage mechanisms for mobile electronic commerce., , , and . Comput. Commun., 29 (12): 2308-2321 (2006)m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data Publishing., , , and . IEEE Trans. Inf. Forensics Secur., (2024)Optimal tag suppression for privacy protection in the semantic Web., , , , and . Data Knowl. Eng., (2012)