Author of the publication

Enforcing trustworthy cloud SLA with witnesses: A game theory-based model using smart contracts.

, , , , and . Concurr. Comput. Pract. Exp., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 60Gbps DPI Prototype based on Memory-Centric FPGA., , , , and . SIGCOMM, page 627-628. ACM, (2016)CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices., , , and . Softw. Pract. Exp., 47 (3): 421-441 (2017)An efficient distributed key management scheme for group-signature based anonymous authentication in VANET., , , and . Secur. Commun. Networks, 5 (1): 79-86 (2012)Implementation of TCP large receive offload on multi-core NPU platform., , and . ICTC, page 258-263. IEEE, (2016)Distributed Opportunistic Scheduling in Cooperative Networks With RF Energy Harvesting., , , and . IEEE/ACM Trans. Netw., 28 (5): 2257-2270 (2020)Exploring potential vulnerabilities in data center network., , and . StudentWorkshop@CoNEXT, page 12:1-12:2. ACM, (2010)Enhancing the effectiveness of traffic engineering in hybrid SDN., , and . ICC, page 1-6. IEEE, (2017)Automatic privacy leakage detection for massive android apps via a novel hybrid approach., , , and . ICC, page 1-7. IEEE, (2017)Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System., , , and . JNIT, 1 (3): 96-105 (2010)A novel steganography approach for voice over IP., , , , , and . J. Ambient Intell. Humaniz. Comput., 5 (4): 601-610 (2014)