Author of the publication

Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks.

, and . International Conference on Wireless Networks, page 144-150. CSREA Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks., and . International Conference on Wireless Networks, page 144-150. CSREA Press, (2004)Performance Analysis of WiMAX Networks AC., , and . Wireless Personal Communications, 74 (1): 133-146 (2014)Data security in ad hoc networks using multipath routing., and . PIMRC, page 1331-1335. IEEE, (2003)Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks., , , and . ICC, page 1-6. IEEE, (2009)A Trust-Based Routing Protocol for Ad Hoc Networks., , and . MWCN, volume 162 of IFIP, page 251-262. Kluwer/Springer, (2004)A Real Time Adaptive Scheduling Scheme for Multi-Service Flows in WiMAX Networks., , and . GLOBECOM, page 1652-1656. IEEE, (2008)Call Admission Control in Small Cell Networks with Retrials and Guard Channels., , , and . GLOBECOM, page 1-6. IEEE, (2016)An Energy Efficient Priority-Based QoS MAC Protocol for Wireless Sensor Networks., , and . ICC, page 1-6. IEEE, (2011)On the applicability of SAN in modeling and analyzing a Priority Queue Management based congestion control for WMSNs., , and . ICC, page 1-6. IEEE, (2017)Security equipment in ad hoc networks., and . VTC Spring, page 1819-1823. IEEE, (2002)