Author of the publication

On Optimizing Compatible Security Policies in Wireless Networks.

, , and . EURASIP J. Wireless Comm. and Networking, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lower bounds and new constructions on secure group communication schemes., , , and . Theor. Comput. Sci., 407 (1-3): 511-523 (2008)Broadcast Scheduling in Interference Environment., , , and . IEEE Trans. Mob. Comput., 7 (11): 1338-1348 (2008)New PMEPR bounding analysis for coded OFDM transmitters., and . GLOBECOM, page 2356-2360. IEEE, (2012)New statistical studies on OFDM-QAM peak-to-mean-envelope-power ratio., , and . GLOBECOM, page 3596-3601. IEEE, (2013)Analysis and Design of a Novel Randomized Broadcast Algorithm for Scalable Wireless Networks in the Interference Channels., , , and . IEEE Trans. Wirel. Commun., 9 (7): 2206-2215 (2010)Transmission fault-tolerance of iterated line digraphs., , , , and . J. Interconnect. Networks, 5 (4): 475-487 (2004)Evolutional Codes: Novel Efficient Graph Data Representation for Mobile Edge Computing., , , , and . IEEE Trans. Netw. Sci. Eng., 11 (1): 1387-1397 (January 2024)Opportunistic Sensing in Wireless Sensor Networks: Theory and Application., , , and . IEEE Trans. Computers, 63 (8): 2002-2010 (2014)Improving Construction for Connected Dominating Set with Steiner Tree in Wireless Sensor Networks., , , , , and . J. Glob. Optim., 35 (1): 111-119 (2006)SAP: seamless authentication protocol for vertical handoff in heterogeneous wireless networks., , and . QSHINE, page 32. ACM, (2006)