Author of the publication

Game-theory-based batch identification of invalid signatures in wireless mobile networks.

, , , and . INFOCOM, page 262-270. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minimizing the Lennard-Jones potential function on a massively parallel computer., , and . ICS, page 409-416. ACM, (1992)Efficient Anonymous Message Submission., , , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 217-230 (2018)Computational Comparison of Two Algorithms for the Euclidean Single Facility Location Problem., and . INFORMS J. Comput., 3 (3): 207-212 (1991)Achieving the Shortest Clock Period by Inserting the Minimum Amount of Delay., , and . ISAAC, volume 834 of Lecture Notes in Computer Science, page 669-677. Springer, (1994)Application Provisioning in FOG Computing-enabled Internet-of-Things: A Network Perspective., , and . INFOCOM, page 783-791. IEEE, (2018)Survivable and bandwidth-guaranteed embedding of virtual clusters in cloud data centers., , , and . INFOCOM, page 1-9. IEEE, (2017)An improved random walk model for PCS networks.. IEEE Trans. Commun., 50 (8): 1224-1226 (2002)Intelligent Disaster Response via Social Media Analysis A Survey., , , and . SIGKDD Explor., 19 (1): 46-59 (2017)Source-waiting QoS routing in networks with advanced resource reservations., , , and . ICC, page 619-624. IEEE, (2001)Circuits/Cutsets Duality and a Unified Algorithmic Framework for Survivable Logical Topology Design in IP-over-WDM Optical Networks., , and . INFOCOM, page 1026-1034. IEEE, (2009)