Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

p-Percent Coverage in Wireless Sensor Networks., , , and . WASA, volume 5258 of Lecture Notes in Computer Science, page 200-211. Springer, (2008)Differential Privacy Preserving Genomic Data Releasing via Factor Graph., , and . ISBRA, volume 10330 of Lecture Notes in Computer Science, page 350-355. Springer, (2017)Task Allocation Model Based on Worker Friend Relationship for Mobile Crowdsourcing., , , , and . Sensors, 19 (4): 921 (2019)A Survey on Privacy Issues in Mobile Social Networks., and . IEEE Access, (2020)Statistical evaluation of NMR backbone resonance assignment., , , and . Int. J. Bioinform. Res. Appl., 2 (2): 147-160 (2006)Hybrid Blockchain Design for Privacy Preserving Crowdsourcing Platform., , , and . Blockchain, page 26-33. IEEE, (2019)A Dominating Set Based Approach to Identify Effective Leader Group of Social Network., , , , and . COCOON, volume 7936 of Lecture Notes in Computer Science, page 841-848. Springer, (2013)VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks., , , and . IEEE Trans. Mob. Comput., 9 (7): 994-1007 (2010)An energy efficient privacy-preserving content sharing scheme in mobile social networks., , , , , and . Pers. Ubiquitous Comput., 20 (5): 833-846 (2016)Protein-protein interaction and group testing in bipartite graphs., , , and . Int. J. Bioinform. Res. Appl., 1 (4): 414-419 (2005)