Author of the publication

Noah: Keyed Noise Flooding for Wireless Confidentiality.

, , and . Q2SWinet@MSWiM, page 141-148. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of an Interfering Node on Unmanned Aerial Vehicle Communications., and . IEEE Trans. Vehicular Technology, 68 (12): 12150-12163 (2019)Is Blockchain Suitable for Data Freshness? - Age-of-Information Perspective., , , , and . CoRR, (2020)Reliability Improvement Using Receive Mode Selection in the Device-to-Device Uplink Period Underlaying Cellular Networks., , , , and . IEEE Trans. Wirel. Commun., 10 (2): 413-418 (2011)QoS-guaranteed transmission mode selection for efficient resource utilization in multi-hop cellular networks., , , and . IEEE Trans. Wirel. Commun., 7 (10): 3697-3701 (2008)Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks., , , and . IEEE Trans. Wirel. Commun., 10 (12): 3995-4000 (2011)Joint Service Caching and Computing Resource Allocation for Edge Computing-Enabled Networks., , , and . CoRR, (2023)Average Age of Information Penalty of Short-Packet Communications with Packet Management., , , and . CoRR, (2022)Stability region of two-user full-duplex broadcast channel with secrecy constraint., , , , and . ICC, page 1-6. IEEE, (2016)Framework for automated power estimation of android applications., and . MobiSys, page 541-542. ACM, (2013)A New Grouping-ML Detector with Low Complexity for SC-FDMA Systems., , , and . ICC, page 1-5. IEEE, (2010)