Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On minimizing end-to-end delay with optimal traffic partitioning., , and . IEEE Trans. Veh. Technol., 55 (2): 681-690 (2006)On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication., , , , and . IEEE Wirel. Commun. Lett., 1 (4): 324-327 (2012)Adaptive QoS control for real-time video communication over wireless channels., , , , and . Int. J. Ad Hoc Ubiquitous Comput., 1 (1/2): 27-37 (2005)Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (1): 67-76 (2022)mCore: Achieving Sub-millisecond Scheduling for 5G MU-MIMO Systems., , , and . INFOCOM, page 1-10. IEEE, (2021)Coping Uncertainty in Coexistence via Exploitation of Interference Threshold Violation., , , , , and . MobiHoc, page 71-80. ACM, (2019)On prefetching in hierarchical caching systems., , , and . ICC, page 814-818. IEEE, (2003)Proximity-based security using ambient radio signals., , , and . ICC, page 1609-1613. IEEE, (2013)Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication., , , , and . ACSAC, page 681-693. ACM, (2020)BeamStar: a new low-cost data routing protocol for wireless sensor networks., and . GLOBECOM, page 2919-2924. IEEE, (2004)