Author of the publication

AOS: an anonymous overlay system for mobile ad hoc networks.

, , and . Wirel. Networks, 17 (4): 843-859 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial Special Section on Wireless Network Security and Privacy.. IEEE Trans. Vehicular Technology, 59 (2): 518 (2010)A secure hierarchical deduplication system in cloud storage., , , and . IWQoS, page 1-10. IEEE, (2016)Your actions tell where you are: Uncovering Twitter users in a metropolitan area., , , and . CNS, page 424-432. IEEE, (2015)Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance., , , and . INFOCOM, page 954-962. IEEE, (2009)Supervoxel-based brain tumor segmentation with multimodal MRI images., , , , and . Signal Image Video Process., 16 (5): 1215-1223 (2022)A new tool wear monitoring method based on multi-scale PCA., , , , and . J. Intell. Manuf., 30 (1): 113-122 (2019)Bidirectional Underwater Blue-green Laser Communication Based on OFDM Modulation., , , , and . ICCNS, page 49-54. ACM, (2021)DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices., , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 233-248. Springer, (2022)mmLock: User Leaving Detection Against Data Theft via High-Quality mmWave Radar Imaging., , , , , and . ICCCN, page 1-10. IEEE, (2023)Managing Wireless Sensor Networks with Supply Chain Strategy., , , and . QSHINE, page 59-66. IEEE Computer Society, (2004)