Author of the publication

MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense.

, , , , and . IEEE Trans. Mob. Comput., 14 (6): 1203-1217 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Economic-Robust Transmission Opportunity Auction for D2D Communications in Cognitive Mesh Assisted Cellular Networks., , , , , and . IEEE Trans. Mob. Comput., 17 (8): 1806-1819 (2018)Purging the Back-Room Dealing: Secure Spectrum Auction Leveraging Paillier Cryptosystem., , and . IEEE J. Sel. Areas Commun., 29 (4): 866-876 (2011)Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks., , , and . IEEE J. Sel. Areas Commun., 30 (2): 433-441 (2012)SPA: A Secure and Private Auction Framework for Decentralized Online Social Networks., , , , and . IEEE Trans. Parallel Distributed Syst., 27 (8): 2394-2407 (2016)A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks., , , and . IEEE Trans. Mob. Comput., 13 (9): 1927-1941 (2014)Network steganography based on traffic behavior in dynamically changing wireless sensor networks., , and . ICC, page 7304-7309. IEEE, (2015)EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback., , , , and . Network, 2 (1): 190-202 (2022)Fast identification of the missing tags in a large RFID system., , , and . SECON, page 278-286. IEEE, (2011)Privacy-preserving spectral estimation in smart grid., , and . SmartGridComm, page 43-48. IEEE, (2015)Privacy-Preserving Computation for Large-Scale Security-Constrained Optimal Power Flow Problem in Smart Grid., , , and . IEEE Access, (2021)