Author of the publication

Beating resource constrained eavesdroppers: A physical layer security study.

, , and . WiOpt, page 167-174. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Campaigning in Heterogeneous Social Networks: Optimal Control of SI Information Epidemics., and . IEEE/ACM Trans. Netw., 24 (1): 383-396 (2016)Secure Transmission in Amplify-and-Forward Diamond Networks with a Single Eavesdropper., , and . CoRR, (2015)Implementation of a Real Time Passenger Information System, , , , , and . CoRR, (2012)Simulation blocks for TOSSIM-T2., , , , and . COMSWARE, page 17-23. IEEE, (2008)Strategies for utility maximization in social groups with preferential exploration., and . Auton. Agents Multi Agent Syst., 31 (1): 107-129 (2017)Multi-AP Coordination with Centralized Overlay Time-Sliced Scheduling in WiFi Network., , , , , and . COMSNETS, page 276-278. IEEE, (2024)Reliable Multicast in Multi-Access Wireless LANs., and . INFOCOM, page 760-767. IEEE Computer Society, (1999)Automatic Addition and Deletion of Clients in VoIP Conferencing., , , , and . ISCC, page 386-391. IEEE Computer Society, (2001)Fast arbitrary function computation over a wireless network: A linear programming., , , and . WCNC, page 2091-2096. IEEE, (2015)Link dependence probabilities in IEEE 802.11 infrastructure WLANs., and . WiOpt, page 148-153. IEEE, (2015)