Author of the publication

An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks.

, , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 393-407. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-fold effects of prey dispersal on the permanence of discrete predator-prey models., and . ICARCV, page 1315-1320. IEEE, (2014)Efficient Congestion Control Based on Awareness of Multistage Resources (CC-AMR)., , , , and . APNOMS, volume 4773 of Lecture Notes in Computer Science, page 608-611. Springer, (2007)Towards a Key Consuming Detection in QKD-VoIP Systems., , , and . CD-ARES, volume 8708 of Lecture Notes in Computer Science, page 281-285. Springer, (2014)Self-adaptive Retransmission for Network Coding with TCP., , , , and . APPT, volume 8299 of Lecture Notes in Computer Science, page 396-407. Springer, (2013)Stability Analysis for the Disease Free Equilibrium of a Discrete Malaria Model with Two Delays., and . ICIC (2), volume 7390 of Lecture Notes in Computer Science, page 341-349. Springer, (2012)Improving Availability through Energy-Saving Optimization in LEO Satellite Networks., , , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 680-689. Springer, (2014)Towards efficient and practical network coding in delay tolerant networks., , , , , , and . Comput. Math. Appl., 63 (2): 588-600 (2012)Minimizing the maximum lateness in a single-machine scheduling problem with the normal time-dependent and job-dependent learning effect., , and . Appl. Math. Comput., 218 (18): 9438-9441 (2012)SARM: A Congestion Control Algorithm for DTN., , , , and . UIC/ATC, page 869-875. IEEE Computer Society, (2012)Spray and Routing for Message Delivery in Challenged Networks., , and . EUC, page 472-475. IEEE Computer Society, (2010)