Author of the publication

Efficient MAC in cognitive radio systems: A game-theoretic approach.

, , and . IEEE Trans. Wireless Communications, 8 (4): 1984-1995 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of the Internet on Telecommunication Architectures., , , and . Computer Networks, 31 (3): 257-273 (1999)Modeling and testing object-oriented distributed systems with linear-time temporal logic., , and . Concurrency and Computation: Practice and Experience, 13 (5): 385-420 (2001)Integration of Internet and telecommunications: an architecture for hybrid services., , , and . IEEE Journal on Selected Areas in Communications, 17 (9): 1563-1579 (1999)A formal model of rational exchange and its application to the analysis of Syverson's protocol., , and . Journal of Computer Security, 12 (3-4): 551-587 (2004)On the Age of Pseudonyms in Mobile Ad Hoc Networks., , , and . INFOCOM, page 1577-1585. IEEE, (2010)Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks., , , , , , and . NDSS, The Internet Society, (2012)Privacy-Enhancing Technologies for Medical Tests Using Genomic Data., , and . NDSS, The Internet Society, (2013)Secure Vehicular Communication Systems., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)A Survey of Distributed Enterprise Network and Systems Management Paradigms., , and . J. Network Syst. Manage., 7 (1): 9-26 (1999)Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels., , , , , and . IEEE Trans. Dependable Sec. Comput., 5 (4): 208-223 (2008)