Author of the publication

A Trustable Reputation Scheme Based on Private Relationships.

, , , , and . ASONAM, page 19-24. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple Sink Placement with Latency and Reliability Guarantee in Lossy Wireless Sensor Networks., , , and . GLOBECOM, page 1-7. IEEE, (2018)An Inter-Layer Protection Scheme with Block-Based Interleaving for MPEG-DASH over WiFi Multicast., and . VTC Spring, page 1-5. IEEE, (2014)CRT-Based AL-FEC and Its Application on Streaming over the WiMAX Networks for High-Speed Rail Reception., and . VTC Spring, page 1-6. IEEE, (2012)Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem., , , , and . ISPAN, page 260-265. IEEE Computer Society, (2009)An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX., , , and . APSCC, page 199-204. IEEE Computer Society, (2008)Accelerating Raptor Code Decoding Using Group Parameters for IPTV Service Delivery., , , and . SmartCity, page 1003-1009. IEEE Computer Society, (2015)Accelerating Transmission of Streaming Files Based on AL-FEC Protection Blocks., , , , and . COMPSAC, page 1188-1193. IEEE, (2021)Efficient encoding of systematic Raptor codes based on operation lists for known block lengths., , , , and . WCNC, page 4689-4694. IEEE, (2013)CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks., , and . IEEE Trans. Knowl. Data Eng., 25 (7): 1471-1483 (2013)A communication-efficient private matching scheme in Client-Server model., , , and . Inf. Sci., (2014)