Author of the publication

Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution.

, , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending Proportional Fair Scheduling to Buffer-Aided Relay Access Networks., , , and . IEEE Trans. Vehicular Technology, 68 (1): 1041-1044 (2019)A cross-layer approach to resource discovery and distribution in mobile ad hoc networks., , and . Mobility Conference, page 54. ACM, (2006)What does using TCP as an evaluation tool reveal about MANET routing protocols?, and . IWCMC, page 521-526. ACM, (2006)Deploying Directional Sensor Networks with Guaranteed Connectivity and Coverage., , , and . SECON, page 153-160. IEEE, (2008)CONI: Credit-Based Overlay and Interweave Dynamic Spectrum Access Protocol for Multi-Hop Cognitive Radio Networks., , and . GLOBECOM, page 1-6. IEEE, (2011)Coordinated power conservation for ad hoc networks., and . ICC, page 3330-3335. IEEE, (2002)Adaptive topology control for heterogeneous mobile ad hoc networks using power estimation., , and . WCNC, page 392-399. IEEE, (2006)A Graph Matching Approach to Optimal Task Assignment in Distributed Computing Systems Using a Minimax Criterion., and . IEEE Trans. Computers, 34 (3): 197-203 (1985)Power Efficient User Pairing for Multicasting in Heterogeneous Wireless Networks., , , and . MILCOM, page 1353-1358. IEEE, (2013)Protocol-independent multicast packet delivery improvement service for mobile Ad hoc networks., and . Ad Hoc Networks, 5 (2): 210-227 (2007)