Author of the publication

A General Method to Determine Asymptotic Capacity Upper Bounds for Wireless Networks.

, , , , , and . IEEE Trans. Netw. Sci. Eng., 6 (1): 2-15 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Device Pairing., , and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Welcome message., , and . CNS, page 1-2. IEEE, (2013)Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing., , , and . INFOCOM, page 525-533. IEEE, (2010)The transmission of MPEG-2 VBR video under usage parameter control., , , and . Int. J. Commun. Syst., 14 (2): 125-146 (2001)On Relay Node Placement and Assignment for Two-tiered Wireless Networks., , , and . Mob. Networks Appl., 13 (1-2): 186-197 (2008)Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data., , , , and . IEEE Trans. Parallel Distributed Syst., 25 (1): 222-233 (2014)On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks., , , and . Mob. Networks Appl., 12 (5-6): 347-357 (2007)Anonymous communications in mobile ad hoc networks., , and . INFOCOM, page 1940-1951. IEEE, (2005)On throughput efficiency of geographic opportunistic routing in multihop wireless networks., , , and . QSHINE, page 41. ACM, (2007)Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking., , , , , , and . IEEE Trans. Parallel Distributed Syst., 25 (11): 3025-3035 (2014)