From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Three-Way Authentication Protocol for Public Access Wireless Networks., и . International Conference on Wireless Networks, стр. 195-201. CSREA Press, (2004)Telegeoinformatics: A Novel Approach Towards Efficient Resource Allocation and Application and Protocol Development for Wireless Communications., , и . PDPTA, CSREA Press, (2000)Special section on collaborative big data., и . Inf. Syst., (2015)A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks., и . CollaborateCom, том 10 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 715-731. Springer / ICST, (2008)MAC Layer Throughput Estimation in Impulse-Radio UWB Networks., , , и . IEEE Trans. Mob. Comput., 10 (5): 700-715 (2011)Spotting Anomalous Trades in NFT Markets: The Case of NBA Topshot., , , и . CoRR, (2022)A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks., , , , и . IEEE Trans. Mob. Comput., 10 (4): 505-518 (2011)On indoor position location with wireless LANs., , и . PIMRC, стр. 720-724. IEEE, (2002)Decoupling trust and wireless channel induced effects on collaborative sensing attacks., , , , , и . DySPAN, стр. 224-235. IEEE, (2014)Identifying Malicious Nodes in Multihop IoT Networks using Dual Link Technologies and Unsupervised Learning., , , и . Open J. Internet Things, 4 (1): 109-125 (2018)