Author of the publication

Buffer-aided secure two-hop communications with adaptive link selection and on/off power control.

, , and . WCSP, page 1-6. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Broadbeam for Massive MIMO Systems., , and . CoRR, (2015)Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model., , and . Informatica, 23 (3): 443-460 (2012)Adaptively Secure Threshold Signature Scheme in the Standard Model., , and . Informatica, 20 (4): 591-612 (2009)Characterization of the East - West Spatial Uniformity for GOES-16/17 ABI Bands Using the Moon., , , and . Remote. Sens., 15 (7): 1881 (April 2023)Privacy-Preserving Locally Weighted Linear Regression Over Encrypted Millions of Data., , , and . IEEE Access, (2020)Design methodology for the IBM POWER7 microprocessor., , , , , , , , , and 15 other author(s). IBM J. Res. Dev., 55 (3): 9 (2011)Power grid analysis using random walks., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 24 (8): 1204-1224 (2005)Bounded-collusion decentralized ABE with sublinear parameters., , , , and . Theor. Comput. Sci., (June 2023)PartitionChain: A Scalable and Reliable Data Storage Strategy for Permissioned Blockchain., , and . IEEE Trans. Knowl. Data Eng., 35 (4): 4124-4136 (April 2023)A new threshold proxy signature scheme from bilinear pairings., , and . Sci. China Ser. F Inf. Sci., 47 (5): 612-622 (2004)