Author of the publication

Chaining for securing data provenance in distributed information networks.

, , , and . MILCOM, page 1-6. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intuitionistic fuzzy based DEMATEL method for developing green practices and performances in a green supply chain., , and . Expert Syst. Appl., 42 (20): 7207-7220 (2015)Supplier risk assessment based on trapezoidal intuitionistic fuzzy numbers and ELECTRE TRI-C: a case illustration involving service suppliers., and . JORS, 67 (2): 339-376 (2016)Provenance-Based Information Trustworthiness Evaluation in Multi-Hop Networks., , and . GLOBECOM, page 1-5. IEEE, (2010)Probability Density of the Received Power in Mobile Networks., , and . IEEE Trans. Wireless Communications, 10 (11): 3613-3619 (2011)Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey., and . IEEE Communications Surveys and Tutorials, 14 (2): 279-298 (2012)Unified Fuzzy Divergence Measures with Multi-Criteria Decision Making Problems for Sustainable Planning of an E-Waste Recycling Job Selection., , , , , and . Symmetry, 12 (1): 90 (2020)Contract analysis: A performance measures and profit evaluation within two-echelon supply chains., , and . Comput. Ind. Eng., 63 (1): 58-74 (2012)Comments on the erratum to "The spatial and temporal consolidation of returned products in a closed-loop supply chain network" Comput. Ind. Eng. 51(2006) 309-320., , and . Comput. Ind. Eng., 54 (4): 1087-1090 (2008)Green supplier development program selection using NGT and VIKOR under fuzzy environment., and . Comput. Ind. Eng., (2016)A Cross Layer Routing Protocol for Multihop Cellular Networks., , , , and . Wireless Personal Communications, 51 (3): 427-447 (2009)