Author of the publication

Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks.

, and . ACM Trans. Inf. Syst. Secur., 11 (3): 14:1-14:35 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Interference Steering in Heterogeneous Cellular Networks., , , , and . IEEE Access, (2018)Battery-Aware Mobile Data Service., , , , , , , and . IEEE Trans. Mob. Comput., 16 (6): 1544-1558 (2017)In-Vehicle Phone Localization for Prevention of Distracted Driving., and . IEEE Trans. Mob. Comput., 22 (6): 3365-3379 (June 2023)Context-Aware Beam Tracking for 5G mmWave V2I Communications., and . IEEE Trans. Mob. Comput., 22 (6): 3257-3269 (June 2023)Coordinated Multi-Point Transmissions Based on Interference Alignment and Neutralization., , , , , and . IEEE Trans. Wirel. Commun., 18 (7): 3347-3365 (2019)A unified wireless LAN architecture for real-time and non-real-time communication services., and . IEEE/ACM Trans. Netw., 8 (1): 44-59 (2000)An uplink CDMA system architecture with diverse QoS guarantees for heterogeneous traffic., and . IEEE/ACM Trans. Netw., 7 (5): 616-628 (1999)A Router Architecture for Real-Time Communication in Multicomputer Networks., , and . IEEE Trans. Computers, 47 (10): 1088-1101 (1998)Ensuring Fault Tolerance of Phase-Locked Clocks., , and . IEEE Trans. Computers, 34 (8): 752-756 (1985)Scalable Hardware Priority Queue Architectures for High-Speed Packet Switches., , and . IEEE Trans. Computers, 49 (11): 1215-1227 (2000)