Author of the publication

A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks.

, , , , and . Comput. Commun., 35 (17): 2125-2137 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolving Secret Sharing with Essential Participants., and . IACR Cryptol. ePrint Arch., (2020)Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure., , and . ICDCIT, volume 8956 of Lecture Notes in Computer Science, page 278-287. Springer, (2015)Structural Form of a Minimal Critical Set for a Latin Square Representing the Elementary Abelian 2-group of Order 8., and . Ars Comb., (2015)Efficient Constructions for t- (k, n)*-Random Grid Visual Cryptographic Schemes., , and . IACR Cryptology ePrint Archive, (2017)An efficient IND-CCA2 secure Paillier-based cryptosystem., and . Inf. Process. Lett., 112 (22): 885-888 (2012)Contrast Optimal XOR Based Visual Cryptographic Schemes., and . ICITS, volume 10681 of Lecture Notes in Computer Science, page 58-72. Springer, (2017)A New Black and White Visual Cryptographic Scheme for General Access Structures., , and . INDOCRYPT, volume 3348 of Lecture Notes in Computer Science, page 399-413. Springer, (2004)Maximal contrast color visual secret sharing schemes., , and . Des. Codes Cryptogr., 87 (7): 1699-1711 (2019)Essential secret image sharing scheme with small and equal sized shadows., and . Signal Process. Image Commun., (2020)Full key recovery of ACORN with a single fault., , and . J. Inf. Secur. Appl., (2016)