Author of the publication

Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems.

, , , , , and . IEEE Trans. Information Forensics and Security, 6 (3-1): 521-522 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic flooding in stochastic networks: Analysis of global information outreach., , , and . Computer Networks, 56 (1): 142-156 (2012)Experimental study on the impact of vehicular obstructions in VANETs., , , , and . VNC, page 338-345. IEEE, (2010)On the capacity of the reachback channel in wireless sensor networks., and . IEEE Workshop on Multimedia Signal Processing, page 408-411. IEEE, (2002)Analysis of Probabilistic Flooding: How Do We Choose the Right Coin?, , , and . ICC, page 1-6. IEEE, (2009)Network coding for wireless cooperative networks: Simple rules, near-optimal delay., , and . ICC Workshops, page 255-260. IEEE, (2014)Optimal strategies for side-channel leakage in FCFS packet schedulers., , and . ISIT, page 2515-2519. IEEE, (2015)On the Delay Distribution of Random Linear Network Coding., , , , and . IEEE Journal on Selected Areas in Communications, 29 (5): 1084-1093 (2011)Minimizing the completion time of a wireless cooperative network using network coding., , and . PIMRC, page 2016-2020. IEEE, (2013)TVR - Tall Vehicle Relayingin Vehicular Networks., , , , and . IEEE Trans. Mob. Comput., 13 (5): 1118-1131 (2014)Wireless transmission of packet audio using multiple descriptions., and . PIMRC, page 2452-2455. IEEE, (2002)