From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scaling of Spatial Reuse and Saturation Throughput in a Class of MAC Protocols., , и . IEEE Trans. Wirel. Commun., 6 (10): 3529-3533 (2007)PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT., , , , , и . IEEE Internet Things J., 10 (10): 8547-8559 (мая 2023)Fault Resilient Authentication Architecture for Drone Networks., и . ICC Workshops, стр. 866-871. IEEE, (2022)A Blockchain and Machine Learning based Framework for Efficient Health Insurance Management., , , и . SenSys, стр. 511-515. ACM, (2021)Detecting Selective Forwarding using Sentinels in lustered IoT Networks., , , , и . GLOBECOM, стр. 1-6. IEEE, (2020)Misbehaviour Detection for Smart Grids using a Privacy-centric and Computationally Efficient Federated Learning Approach., , , , и . GLOBECOM, стр. 2269-2274. IEEE, (2023)PIC: Preserving Data Integrity in UAV Assisted Communication., , , и . INFOCOM Workshops, стр. 1-6. IEEE, (2022)POSTER: Security Logs Graph Analytics for Industry Network System., , , и . AsiaCCS, стр. 1043-1045. ACM, (2023)Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges., , и . IEEE Trans. Ind. Informatics, 19 (1): 867-869 (2023)Analytic models for the latency and steady-state throughput of TCP tahoe, Reno, and SACK., , и . IEEE/ACM Trans. Netw., 11 (6): 959-971 (2003)