Author of the publication

Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts.

, , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 991-998. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incentive mechanism in wireless multicast., , and . ICASSP, page 2344-2347. IEEE, (2011)Efficient jamming strategies on a MIMO Gaussian channel with known target signal covariance., , and . ICASSP, page 5700-5704. IEEE, (2014)Cross-layer resource allocation for integrated Voice/Data traffic in wireless cellular networks., and . IEEE Trans. Wireless Communications, 5 (2): 457-468 (2006)Redefinition of max-min fairness in multi-hop wireless networks., , , and . IEEE Trans. Wireless Communications, 7 (12-1): 4786-4791 (2008)Joint medium access control, routing and energy distribution in multi-hop wireless networks., , , , and . IEEE Trans. Wireless Communications, 7 (12-2): 5244-5249 (2008)Optimal selection of channel sensing order in cognitive radio., , , and . IEEE Trans. Wireless Communications, 8 (1): 297-307 (2009)Analysis of area under the ROC curve of energy detection., , and . IEEE Trans. Wireless Communications, 9 (3): 1216-1225 (2010)Replacement of spectrum sensing in cognitive radio., , and . IEEE Trans. Wireless Communications, 8 (6): 2819-2826 (2009)Cognitive Medium Access: Exploration, Exploitation, and Competition., , , and . IEEE Trans. Mob. Comput., 10 (2): 239-253 (2011)Unified Analysis of Low-SNR Energy Detection and Threshold Selection., , , and . IEEE Trans. Vehicular Technology, 64 (11): 5006-5019 (2015)