Author of the publication

Measuring the performance of movement-assisted certificate revocation list distribution in VANET.

, , , , and . Wireless Communications and Mobile Computing, 11 (7): 888-898 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Cao, Xianghui
add a person with the name Cao, Xianghui
 

Other publications of authors with the same name

Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach., , , and . IEEE Trans. Parallel Distrib. Syst., 25 (4): 1055-1065 (2014)Distributed formation control with pose estimation in multi-robot systems., , , , and . ICCA, page 834-839. IEEE, (2013)Cooperative Message Authentication in Vehicular Cyber-Physical Systems., , , , and . IEEE Trans. Emerging Topics Comput., 1 (1): 84-97 (2013)Building-Environment Control With Wireless Sensor and Actuator Networks: Centralized Versus Distributed., , , and . IEEE Trans. Industrial Electronics, 57 (11): 3596-3605 (2010)Optimal jamming attack schedule for remote state estimation with two sensors., , , and . J. Franklin Institute, 355 (14): 6859-6876 (2018)A Systematic Study of Maximal Scheduling Algorithms in Multiradio Multichannel Wireless Networks., , , and . IEEE/ACM Trans. Netw., 23 (4): 1342-1355 (2015)Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee., , , , , and . CoRR, (2014)Joint Optimization of Scheduling and Power Control in Wireless Network: Multi-Dimensional Modeling and Decomposition., , , , and . CoRR, (2017)Optimal Jamming Attack Strategy Against Wireless State Estimation: A Game Theoretic Approach., , , and . IECON, page 5989-5995. IEEE, (2018)Secure key establishment for Device-to-Device communications., , , , , and . GLOBECOM, page 336-340. IEEE, (2014)