Author of the publication

Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views.

, , , and . Comput. Secur., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architecture for IoT Domain With CoAP Observe Feature., , and . IEEE Internet of Things Journal, 5 (2): 1196-1205 (2018)Bridge Performance in Asynchronous Cognitive Personal Area Networks., , and . IEEE Trans. Vehicular Technology, 65 (9): 7568-7578 (2016)Recovery in Channel-Hopping Cognitive Networks Under Random Primary-User Activity., and . IEEE Trans. Vehicular Technology, 63 (5): 2392-2406 (2014)Sensing with One or with Four? A Comparison of Two IEEE 802.15.x Protocols for Use in Sensor Networks., and . IJDSN, 3 (1): 87-104 (2007)Priority-Based Machine-To-Machine Overlay Network over LTE for a Smart City., , and . J. Sens. Actuator Networks, 7 (3): 27 (2018)Uplink Access Protocol in IEEE 802.11ac., , and . IEEE Trans. Wirel. Commun., 17 (8): 5535-5551 (2018)Impact of Bluetooth MAC layer on the performance of TCP traffic., , and . Wirel. Commun. Mob. Comput., (2006)Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks., , , and . IEEE Trans. Cogn. Commun. Netw., 6 (2): 597-606 (2020)Impact of priority differentiation on the bridged WBAN/WLAN healthcare networks., and . Wirel. Commun. Mob. Comput., 14 (12): 1189-1200 (2014)Enforcing patient privacy in healthcare WSNs through key distribution algorithms., and . Secur. Commun. Networks, 1 (5): 417-429 (2008)