Author of the publication

Reliable Cooperative Sensing in Cognitive Networks - (Invited Paper).

, , and . WASA, volume 7405 of Lecture Notes in Computer Science, page 206-217. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A statistical analysis of vaccine-adverse event data., , , and . BMC Med. Inf. & Decision Making, 19 (1): 101:1-101:12 (2019)A Dual Parameter Synchronous Monitoring System of Brain Edema Based on the Reflection and Transmission Characteristics of Two-Port Test Network., , , , , , , , , and 4 other author(s). IEEE Access, (2019)A Novel Delay-Aware and Privacy-Preserving Data-Forwarding Scheme for Urban Sensing Network., and . IEEE Trans. Vehicular Technology, 65 (4): 2578-2588 (2016)PumaMart: a parallel and autonomous agents based internet marketplace., , and . Electronic Commerce Research and Applications, 3 (3): 294-310 (2004)Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities., , , , , , and . Pervasive and Mobile Computing, (2017)Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks., , , and . IEEE Trans. Parallel Distrib. Syst., 25 (5): 1223-1232 (2014)On the Structure of Hermitian Codes and Decoding for Burst Errors.. IEEE Trans. Information Theory, 50 (11): 2850-2854 (2004)Discrete Dynamic Causal Modeling and Its Relationship with Directed Information., , , , and . CoRR, (2017)ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing., , and . IEEE Trans. Information Forensics and Security, 12 (11): 2518-2531 (2017)Exact scalable sensitivity analysis for the next release problem., , , , , and . ACM Trans. Softw. Eng. Methodol., 23 (2): 19:1-19:31 (2014)