Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Code Based Cryptosystem via Random Insertions, Deletions, and Errors., and . IEEE Communications Letters, 20 (5): 870-873 (2016)Maximum-Girth Cylinder-Type Block-Circulant LDPC Codes., and . IEEE Trans. Communications, 60 (4): 952-962 (2012)Service overlays for Ethernet LAN over SONET/SDH., , , , , and . Optical Switching and Networking, 7 (2): 54-65 (2010)High rate fibonacci polynomial codes., , and . ISIT, page 1921-1924. IEEE, (2011)A Fibonacci-polynomial based coding method with error detection and correction., and . Computers & Mathematics with Applications, 60 (10): 2738-2752 (2010)Applying Variable Competition Range for Prolonging the Lifetime of WSN., , and . MASCOTS, page 357-359. IEEE Computer Society, (2008)Enhanced Crankback Signaling for Multi-Domain Traffic Engineering., , , , , and . ICC, page 1-6. IEEE, (2010)Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic., , and . IJESDF, 2 (1): 49-57 (2009)Intrusion Detection via Fuzzy-Genetic Algorithm Combination with Evolutionary Algorithms., , , and . ACIS-ICIS, page 587-591. IEEE Computer Society, (2007)Advanced crankback provisioning for multi-domain networks., , , and . HPSR, page 209-214. IEEE, (2010)