Author of the publication

REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks.

, , , , , , , and . IEEE Netw., 32 (5): 118-123 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation., , , , , and . IEEE Trans. Veh. Technol., 68 (5): 4834-4845 (2019)Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage., , , , and . IEEE Trans. Cloud Comput., 9 (1): 212-225 (2021)Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers., , , , and . Int. J. Bifurc. Chaos, 27 (10): 1750155:1-1750155:13 (2017)CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing., , , , , , , , and . IEEE Trans. Parallel Distributed Syst., 30 (6): 1251-1266 (2019)HB+DB: Distance bounding meets human based authentication., , , , and . Future Gener. Comput. Syst., (2018)GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks., , , , , and . IACR Cryptol. ePrint Arch., (2022)RFID and Contactless Technology., and . Smart Cards, Tokens, Security and Applications, 2nd Ed., Springer, (2017)An Identity-Based Strong Designated Verifier Dual-Signature Scheme With Constrained Delegatability., , , , , and . IEEE Internet Things J., 11 (10): 17552-17566 (May 2024)Energy-Efficient Distance-Bounding with Residual Charge Computation., , , , and . IEEE Trans. Emerg. Top. Comput., 8 (2): 365-376 (2020)PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments., , , , , , and . IEEE Trans. Serv. Comput., 16 (5): 3564-3577 (September 2023)