Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secrecy Capacity Analysis of Artificial Noisy MIMO Channels - An Approach Based on Ordered Eigenvalues of Wishart Matrices., , and . IEEE Trans. Information Forensics and Security, 12 (3): 617-630 (2017)A Rapid Certification Protocol from Bilinear Pairings for Vehicular Ad Hoc Networks., and . TrustCom, page 890-895. IEEE Computer Society, (2012)A QoS Guarantee Framework for Cloud Services Based on Bayesian Prediction., , , and . CBD, page 117-124. IEEE Computer Society, (2015)A Personalized Extended (a, k)-Anonymity Model., , and . CBD, page 234-240. IEEE Computer Society, (2015)Exploring Trusted Data Dissemination in a Vehicular Social Network with a Formal Compositional Approach., and . COMPSAC Workshops, page 616-617. IEEE Computer Society, (2016)Heterogeneous Flow Scheduling using Deep Reinforcement Learning in Partially Observable NFV Environment., , and . NaNA, page 432-436. IEEE, (2021)Elastic Scheduling of Virtual Machines in Cloudlet Networks., and . IPCCC, page 1-7. IEEE, (2021)ECDS: Efficient collaborative downloading scheme for popular content distribution in urban vehicular networks., and . Computer Networks, (2016)An efficient anonymous authentication protocol using batch operations for VANETs., , , and . Multimedia Tools Appl., 75 (24): 17689-17709 (2016)Towards Efficient Privacy-Preserving Auction Mechanism for Two-Sided Cloud Markets., , , , , and . ICC, page 1-6. IEEE, (2019)