Author of the publication

Efficient Identity-Based Proxy Signature in the Standard Model.

, , and . Comput. J., 58 (4): 792-807 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Techno-economic analysis and prediction for the deployment of 5G mobile network., and . ICIN, page 9-16. IEEE, (2017)Effective Admission Control for Real-Time Anycast Flow., , and . ISPA, volume 2745 of Lecture Notes in Computer Science, page 228-238. Springer, (2003)Energy-Aware Routing Analysis in Wireless Sensors Network., , and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 345-349. Springer, (2006)An Efficient Fibonacci Series Based Hierarchical Application-Layer Multicast Protocol., , and . MSN, volume 4325 of Lecture Notes in Computer Science, page 131-142. Springer, (2006)Centroid Based Classification Model for Location Distinction in Dynamic Wireless Network., and . GLOBECOM, page 2084-2088. IEEE, (2008)Online Joint Scheduling of Delay-Sensitive and Computation-Oriented Tasks in Edge Computing., , , and . MSN, page 303-308. IEEE, (2019)An efficient admission control for IEEE 802.11 networks based on throughput analyses of (un)saturated channel., , and . Int. J. Commun. Syst., 21 (7): 755-771 (2008)Design and analysis of an efficient and reliable atomic multicast protocol., , , and . Comput. Commun., 21 (1): 37-53 (1998)Using Nondeterminism to Design Efficient Deterministic Algorithms., , , and . Algorithmica, 40 (2): 83-97 (2004)Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization., , , , , and . IEEE Trans. Veh. Technol., 60 (5): 2239-2252 (2011)