Author of the publication

Blockchain-Inspired Secure Computation Offloading in a Vehicular Cloud Network.

, , , and . IEEE Internet Things J., 9 (16): 14723-14740 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secrecy Analysis of Multiuser Untrusted Amplify-and-Forward Relay Networks., , , , , and . Wirel. Commun. Mob. Comput., (2017)Opportunistic source scheduling in multi-source two-way relay networks., , , and . Wirel. Commun. Mob. Comput., 16 (4): 459-468 (2016)Forecasting methodology and traffic estimation for satellite multimedia services., , , , and . ICC, page 1084-1088. IEEE, (1999)Joint Computation Offloading and Radio Resource Allocation in MEC-Based Wireless-Powered Backscatter Communication Networks., , , , and . IEEE Trans. Veh. Technol., 70 (6): 6200-6205 (2021)Energy Efficiency and Spectrum Efficiency of Multihop Device-to-Device Communications Underlaying Cellular Networks., , , and . IEEE Trans. Veh. Technol., 65 (1): 367-380 (2016)A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study., , , , , and . IEEE Trans. Veh. Technol., 58 (1): 398-408 (2009)Security Requirements and Standards for 4G and 5G Wireless Systems., , and . GetMobile Mob. Comput. Commun., 22 (1): 15-20 (2018)An energy efficient and spectrum efficient wireless heterogeneous network framework for 5G systems., and . IEEE Commun. Mag., 52 (5): 94-101 (2014)ComSoc Marketing Programs and Information Technology., , and . IEEE Commun. Mag., 60 (7): 4-5 (2022)IEEE Access Special Section Editorial: The Internet of Energy: Architectures, Cyber Security, and Applications - Part II., , , , , and . IEEE Access, (2018)