Author of the publication

When Blockchain Makes Ephemeral Keys Authentic: A Novel Key Agreement Mechanism in the IoT World.

, , and . GLOBECOM Workshops, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy Harvesting in LoRaWAN: A Cost Analysis for the Industry 4.0., , , and . IEEE Commun. Lett., 22 (11): 2358-2361 (2018)Two-Level Downlink Scheduling for Real-Time Multimedia Services in LTE Networks., , , , and . IEEE Trans. Multim., 13 (5): 1052-1065 (2011)Discovering Parameter Setting in 3G Networks via Active Measurements., , and . IEEE Communications Letters, 12 (10): 730-732 (2008)Teletraffic analysis of hierarchical cellular communication networks., , and . IEEE Trans. Vehicular Technology, 52 (4): 931-946 (2003)Gazing into the Crystal Ball: When the Future Internet Meets the Mobile Clouds., , , , , , and . IEEE Trans. Cloud Computing, 7 (1): 210-223 (2019)A dynamic bandwidth allocation algorithm for supporting real-time applications in 802.15.3 wpans., , , and . Q2SWinet, page 8-15. ACM, (2007)DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections., , and . TMA, volume 6003 of Lecture Notes in Computer Science, page 87-100. Springer, (2010)A tenant-driven slicing enforcement scheme based on Pervasive Intelligence in the Radio Access Network., , , , and . Comput. Networks, (2022)Decentralized Traffic Aware Scheduling in 6TiSCH Networks: Design and Experimental Evaluation., , , , , and . IEEE Internet Things J., 2 (6): 455-470 (2015)Performance assessment and tuning rules for low-power and lossy stacks., , , , and . WFCS, page 71-74. IEEE, (2012)