Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient secure outsourcing of large-scale linear systems of equations., , , and . INFOCOM, page 1035-1043. IEEE, (2015)Energy-Source-Aware Cost Optimization for Green Cellular Networks with Strong Stability., , , , and . IEEE Trans. Emerging Topics Comput., 4 (4): 541-555 (2016)Optimal Energy Cost for Strongly Stable Multi-hop Green Cellular Networks., , , , and . ICDCS, page 62-72. IEEE Computer Society, (2014)Multi-Objective Optimal Energy Consumption Scheduling in Smart Grids., , and . IEEE Trans. Smart Grid, 4 (1): 341-348 (2013)Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks., , , and . IEEE Trans. Parallel Distrib. Syst., 26 (6): 1547-1559 (2015)Privacy-preserving energy theft detection in smart grids., , and . SECON, page 605-613. IEEE, (2012)Optimal Scheduling for Multi-Radio Multi-Channel Multi-Hop Cognitive Cellular Networks., , , , , and . IEEE Trans. Mob. Comput., 14 (1): 139-154 (2015)MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense., , , , and . IEEE Trans. Mob. Comput., 14 (6): 1203-1217 (2015)A Tutorial on Secure Outsourcing of Large-scale Computations for Big Data., , , and . IEEE Access, (2016)A promising security protocol for protecting near field communication devices from networking attacks., , and . IJSN, 13 (2): 98-107 (2018)